On Tue, 26 May 2015, Igor Bukanov wrote:
> Hi,
>
> If I need to provide an ssh access just for a single user and I want
> to minimize a chance of malicious code running as root even if it
> increases a possibility for malicious code running as that user. Given
> that should I try running sshd as that user? Or should I continue to
> use UsePrivilegeSeparation=sandbox with sshd running as root?
It depends which operating system you are on - if you're running
on something with a good platform sandbox (systrace, seatbelt or
seccomp-bpf) then you'll have good protection from that even if
you are running sshd as the target user.
If your platform doesn't have one of the above sandboxed available,
then you should run as root to get the benefit of chroot and dropping
to an unprivileged user.
-d