On Wed, 20 Feb 2008 14:02:34 -0500, LeRoy, Ted wrote
> I'm taking a class on system security.  We're in teams and we have to
> allow attacking teams ssh access to our devices.
> 
> I'd like to limit the user account access for the other groups,
> permitting them a shell and a few commands, but no ability to browse 
> the box or do things like cat or cp /etc/passwd.
> 
> I'm running OpenBSD 4.2 on the server they'll be attacking.  I'm an
> OpenBSD noob.  Learning under fire.
> 
> If someone can help me figure out whether using ssh_config, chroot,
>  or just using permissions will be the easiest, most effective way 
> to go about it, and how to proceed, it will be much appreciated.  Alternatives
> would be great too.
> 
> Thanks!
> 
> Ted LeRoy

Ted,

A new sftp chroot restriction environment is now available in -current; you
may find the discussion at the OpenBSD Journal helpful:

http://undeadly.org/cgi?action=article&sid=20080220110039

Reply via email to