Know your code.
One can have sftp access to a chroot dir only, no binaries required. This
is similar but much more secure than ftpd's chroot support, with builtin ls
and such.
If you want to chroot a user with a shell, thats entirely different and much
more work and not simple in any regard.
Pe
On 1/8/10, Todd T. Fries wrote:
> You can chroot internal-sftp but not external.
well i chrooted external no prob, just put insude the chroot what ldd
/usr/libexec/sftp-server and i found out that the only thing, which is
sftp-server couldn't live without is /etc/pwd.db (besides minimal
device se
You can chroot internal-sftp but not external.
Penned by Denis Doroshenko on 20100108 16:50.31, we have:
| hi,
|
| is there any benefits of using internal-sftp over
| /usr/libexec/sftp-server (which is being used with default
| sshd_config)? sshd_config(5) says:
|
| For file transfe
hi,
is there any benefits of using internal-sftp over
/usr/libexec/sftp-server (which is being used with default
sshd_config)? sshd_config(5) says:
For file transfer sessions using
``sftp'', no additional configuration of the environment is nec-
essary if th
4 matches
Mail list logo