|
From: | Richard Scott |
Subject: | Re: [Jailkit-users] Howto jail a ssh ftp user on a server with jailkit |
Date: | Tue, 12 Feb 2013 12:24:24 +0000 |
User-agent: | Webmail/1.0 |
Hi,
I think i've used this before in SSH. If its what I think it is you you need to add something like this into /etc/ssh/sshd_config
Match User liam
ChrootDirectory /home/liam
ForceCommand internal-sftp
it would restrict the "liam" user to only write to files/folders in /home/liam that liam owns.
In my opinion JailKit is far better than this and should be used instead of chrooting users in this way?
Rich
On 12/02/2013 08:08 AM, Olivier Sessink wrote:
On 02/11/2013 07:42 PM, Bill Winnett wrote:Sorry if I am n00bish. I have a ssh ftp server running that chroots users fine. With the introduction of jailkit, I can allow users ssh acces and chroot them. These new ssh access users can then use the ssh ftp to roam around the system. Obviously I have not configured something correctly, *or* there is no why to run a sshd/ftp server config and jail users who also can login. Does anyone maybe know how to do this?I'm sorry but I have little or no experience with the sshd option to chroot a users. Olivier
[Prev in Thread] | Current Thread | [Next in Thread] |