Re: using OpenSSH/SFTP to replace an FTP server securely

[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

 



On Mon, 19 May 2014, ?ngel Gonz?lez wrote:

> If you want something different, like chrooting them at /chrooted-users/foo,
> you
> can use -d parameter in the ForceCommand, ie.
>  ForceCommand internal-sftp -d /%u

If you're willing to live with a single chroot directory and file
permissions to keep users from each others' files then this is a great
solution. It only requires a single /chrooted-users/dev/log listener
too.

-d
_______________________________________________
openssh-unix-dev mailing list
openssh-unix-dev@xxxxxxxxxxx
https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev




[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux