On Sat, Oct 25, 2003 at 08:35:18PM +0530, Krishna Shekhar wrote: > If you are using vftpd then this trick will do. Add the following the > /etc/vsftpd.conf However, the original poster said ftp over ssh (sftp), which we should all realize isn't ftp anyway. The two are quite different. The short answer is that chroot'ing ssh/sftp sessions is not secure and it's not a priority for the openssh group. sftp is simply not a replacement for ftp for large environments that don't have control over their user base. There are secure ftp implementations (ftp/tls), but they have their restrictions. .../Ed > chroot_list_enable=yes > chroot_list_file=/etc/vsftpd.chroot_list > > Then add the users you want to chroot in /etc/vsftpd.chroot_list > > regards, > Krishna > RHCE > Network/Systems Engineer > Spectranet > > http://www.krisindigitalage.com > > >Is there a way I can set a default directory outside of the home directory > >for users ftp'ing over ssh (sftp)? Basically like you can with most (if > >not all) ftp servers, so that when the user logs in, he starts in that > >directory, and cannot move around above that directory. -- Ed Wilts, Mounds View, MN, USA mailto:ewilts@xxxxxxxxxx Member #1, Red Hat Community Ambassador Program -- redhat-list mailing list unsubscribe mailto:redhat-list-request@xxxxxxxxxx?subject=unsubscribe https://www.redhat.com/mailman/listinfo/redhat-list