Josh Grosse wrote:

A new sftp chroot restriction environment is now available in -current; you
may find the discussion at the OpenBSD Journal helpful:

http://undeadly.org/cgi?action=article&sid=20080220110039

1) What is the timeline for completely dropping scp?

2) ChrootDirectory and similar features in sshd_config are great. DenyGroups and AllowGroups were ones that I had really wanted.

Along those lines, the example given in the undeadly article above apply access controls at the user level. Applying them at the group level is often considered more maintainable and scalable. The example from the article would look like this instead:

        Match group uploaders
            ForceCommand internal-sftp
            ChrootDirectory /chroot

Where user djm is a member of the group uploaders.

Regards,
-Lars

Reply via email to