Yes, I guess you are right... Well, I have another question... In WS_FTP Pro there is
an option "secure (SSL)"... but it's not about sftp... what the hell that means? Is
there another way of doing FTP secure?

Joćo.

Ed Wilts wrote:

> On Thu, May 09, 2002 at 09:22:34AM -0400, Joao Borsoi Soares wrote:
> > Ed Wilts,
> >
> > I found a good and easy sollution for my problem... I think you may want to do
> > the same... I just wrote a simple C program to be my shell... I think it may be a
> > shell script also.. Take a look bellow...
>
> You found an easy solution, not a good one.  Anyone with sftp access now
> has access to any world-readable file on the system, including your
> password file (although it doesn't normally contain passwords, it does
> contain a list of all valid users on your system).
>
> I said that there was no way to chroot your users, and I meant it.  Any
> directory that is readable by your users is now retrievable.  Any
> directory that is writable is now open to a DOS attack - for example, if
> I had an sftp account on your system, I could fill /tmp or /var/tmp.  If
> /var/tmp is not on a separate partition, I've just filled /var and
> disabled all your incoming mail.
>
> Cheers,
>         .../Ed
>
> >
> > #include <stdio.h>
> >
> > int main(int argc, char**argv)
> > {
> >  if(argc != 3)
> >     exit(1);
> >
> >   if(strcmp(argv[1], "-c") == 0 &&
> >      strcmp(argv[2], "/usr/libexec/openssh/sftp-server") == 0)
> >   {
> >     system(argv[2]);
> >     exit(0);
> >   }
> >
> >   exit(1);
> > }
> >
> > Ed Wilts wrote:
> >
> > > On Wed, May 08, 2002 at 05:25:47PM -0400, Joao Borsoi Soares wrote:
> > > > But how can I have security with old ftp? Will I have to implement something
> > > > to handle uploads throught web interface?
> > >
> > > What kind of security are you after?  What I've done for my office
> > > server is to tightly manage the ftpaccess file.  Files can only be
> > > uploaded into specific directories for each user, and can only be
> > > downloaded from other specific per-user directories.  Once a file is
> > > uploaded, it can not be downloaded unless someone here moves it.
> > >
> > > Yes, ftp does transmit usernames and passwords in clear text - that
> > > doesn't mean you ignore the protocol completely.
> > >
> > > Another alternative is to use something like WebFTP - this is a web
> > > interface to ftp so that you can use ftp between the file server and the
> > > web server (and they could be the same box) and ssl to the end user.
> > > I'm still testing a couple of clients and neither is perfect, but with
> > > enough tweaking, they can be made to work securely.
> > >
> > > >
> > > > Joao.
> > > >
> > > > Ed Wilts wrote:
> > > >
> > > > > On Wed, May 08, 2002 at 01:02:38PM -0400, Joao Borsoi Soares wrote:
> > > > > >
> > > > > > I have a webserver in my company running RH7.1. I need to enable my
> > > > > > clients to do FTP to their areas. But I want them to do that only
> > > > > > throught SHH (sftp). And I don't want them to be able to open a shell. I
> > > > > > tried to put /bin/false in the passwd file, but when I made it, they
> > > > > > were unable enven to do sftp. Can anyone help me?
> > > > >
> > > > > You can't do what you want.  ssh doesn't support a chrooted environment
> > > > > although there are some unsupported hacks around that.  Your best bet is
> > > > > good old-fashioned ftp.
>
> --
> Ed Wilts, Mounds View, MN, USA
> mailto:[EMAIL PROTECTED]
>
> _______________________________________________
> Redhat-list mailing list
> [EMAIL PROTECTED]
> https://listman.redhat.com/mailman/listinfo/redhat-list



_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to