Re: Feature request: allow chrooted directory writable by others

[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

 



On Mon, Jul 15, 2019 at 6:44 AM David Newall <openssh@xxxxxxxxxxxxxxx> wrote:
>
> On 15/7/19 7:54 pm, Ramón García wrote:
> > I am trying to setup a file server using the SFTP protocol with OpenSSH.
> >
> > I am in trouble because sshd refuses to chroot to a directory that is
> > writable by users other than the owner.
>
> I doubt that you need the root to be writeable.  Put your files inside a
> globally writeable sub-directory.  This allows you to have a dev, bin,
> lib, and whatever, within your chroot, without leaving yourself open
> someone tearing you a new one.

Being ale to write to root means being able to replace /etc/ and
/tmp/, and /proc, with non-root owned directories. It's very
dangerous.

Most of us accept being able to write to "/ome/username", where
"/home" is owned by root and prevents the deletion or relocation of
"/home/username", as sufficient. Or we accept a shared sftp workspace,
such as "/var/projectname"

> If somebody says, "but I need to write to root", your go-to answer is
> "no, you don't; and get off my lawn."
>
> Also, look at rssh.

rssh is not being maintained, sadly. If someone wants hooks for that,
I publish some updated chroot cage building tools for it, which I
built up for an employer who used a public scp and sftp upload site
rather than the FTPS site I recommended for them, which have been much
easier to set up.
_______________________________________________
openssh-unix-dev mailing list
openssh-unix-dev@xxxxxxxxxxx
https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev




[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux