SFTP CHROOTING
Par Arnaud Charlier, samedi 5 décembre 2009 à 16:55 :: Linux et Debian :: #40 :: rss
This is a small tutorial to configure and securise an SFTP server based on OpenSSH
First Install openssh-server
Then add in the file : /etc/ssh/sshd_config
... Subsystem sftp internal-sftper Match group sftponly ChrootDirectory /home/%u/ftp X11Forwarding no AllowTcpForwarding no ForceCommand internal-sftp ...
Then the User folder should owned by root in the Bash
chown root.root /home/user usermod -d / user addgroup sftponly adduser user sftponly
Then you could create a folder in
/home/user/newfolderWith writting rights for the group or the user.
Restart SSH
Commentaires
Aucun commentaire pour le moment.
Ajouter un commentaire
Les commentaires pour ce billet sont fermés.