[Top][All Lists]

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Jailkit-users] Howto jail a ssh ftp user on a server with jailkit

From: Richard Scott
Subject: Re: [Jailkit-users] Howto jail a ssh ftp user on a server with jailkit
Date: Tue, 12 Feb 2013 12:24:24 +0000
User-agent: Webmail/1.0


I think i've used this before in SSH. If its what I think it is you you need to add something like this into /etc/ssh/sshd_config

Match User liam
  ChrootDirectory /home/liam
  ForceCommand internal-sftp

it would restrict the "liam" user to only write to files/folders in /home/liam that liam owns.

In my opinion JailKit is far better than this and should be used instead of chrooting users in this way?



On 12/02/2013 08:08 AM, Olivier Sessink wrote:

On 02/11/2013 07:42 PM, Bill Winnett wrote:
Sorry if I am n00bish. I have a ssh ftp server running that chroots users fine. With the introduction of jailkit, I can allow users ssh acces and chroot them. These new ssh access users can then use the ssh ftp to roam around the system. Obviously I have not configured something correctly, *or* there is no why to run a sshd/ftp server config and jail users who also can login. Does anyone maybe know how to do this?
I'm sorry but I have little or no experience with the sshd option to
chroot a users.


reply via email to

[Prev in Thread] Current Thread [Next in Thread]