Displaying 7 results from an estimated 7 matches for "sftpuser".
Did you mean:
ftpuser
2009 Mar 13
0
winbind cache seems to change the group membership of a user
...ry" option for the sshd daemon to jail my ssh
users. Additionally, I'm using the "Match group" option to only jail people
belonging to a specific active directory group. Here are the relevant lines
of the sshd_config file:
LogLevel Debug3
Subsystem sftp internal-sftp
Match group sftpusers
ChrootDirectory /my/chroot/home
ForceCommand internal-sftp
sftpusers is an active directory group.
I logged me in with a user belonging to that group. The first time, the user
will only see the home directories of the other jailed users, so, the real
root path won't be showed. However, if...
2009 Oct 23
3
internal-sftp only without ssh and scp hanging
I've configured OpenSSH_5.3p1 to only allow sftp connections (openssh
chroot functionality).
i.e.
Subsystem sftp internal-sftp
Match group sftpusers
ChrootDirectory /chroot/%u
X11Forwarding no
AllowTcpForwarding no
ForceCommand internal-sftp
So far everything works correctly with sftp but when a user ssh's or
scp's to the box the login hangs after authentication.
Is there anyway to get sshd to close...
2019 Jun 21
2
Samba winbind on redhat 7
...--enablewinbindauth
> --enablemkhomedir --update
>
> My sftp access did not work. Does it change the way to pass the login ?
> I used to connect in sftp with userlogin / userpassword
>
> //var/log/secure ://
> /
>
> /Jun 21 11:08:31 [localhost] sshd[17379]: Invalid user sftpuser from
> x.x.x.x port 50187//
> //Jun 21 11:08:31 [localhost] sshd[17379]: input_userauth_request:
> invalid user sftpuser [preauth]//
> //Jun 21 11:08:31 [localhost] sshd[17379]: pam_unix(sshd:auth): check
> pass; user unknown//
> //Jun 21 11:08:31 [localhost] sshd[17379]: pam_u...
2019 Jun 20
2
Samba winbind on redhat 7
This way is so easier...
Thank you Rowland
Le 20/06/2019 ? 14:01, Rowland penny via samba a ?crit?:
> On 20/06/2019 17:54, Edouard Guign? via samba wrote:
>> My idea is to replace default "cifs_idmap_sss.so" plugin by
>> "idmapwb.so" winbind plugin, in order to SSSD becomes a client of
>> winbind.
>> To avoid to change nsswitch.conf :
>>
2012 Nov 12
5
[Bug 2048] New: Make chrooted sftp more user friendly using bind mount (solution suggested)
...cture because this will often leave him
confused and he'll often call helpdesk and complain about it. That's
one of reasons why we have chroot support in OpenSSH. Other reason is
obvious: better security.
So this is typical configuration:
Subsystem sftp internal-sftp
Match Group sftpusers
ChrootDirectory %h
ForceCommand internal-sftp
AllowTcpForwarding no
It has one big problem. For security reasons we cannot chroot into
directory that is not owned by root (or writable by user). There's
probably nothing we can do about this right now, but let's take a
deeper look...
2019 Jun 21
0
Samba winbind on redhat 7
...blemkhomedir --update
>>
>> My sftp access did not work. Does it change the way to pass the login ?
>> I used to connect in sftp with userlogin / userpassword
>>
>> //var/log/secure ://
>> /
>>
>> /Jun 21 11:08:31 [localhost] sshd[17379]: Invalid user sftpuser from
>> x.x.x.x port 50187//
>> //Jun 21 11:08:31 [localhost] sshd[17379]: input_userauth_request:
>> invalid user sftpuser [preauth]//
>> //Jun 21 11:08:31 [localhost] sshd[17379]: pam_unix(sshd:auth): check
>> pass; user unknown//
>> //Jun 21 11:08:31 [local...
2019 Jun 21
0
Samba winbind on redhat 7
...# authconfig --enablekrb5 --enablewinbind --enablewinbindauth
--enablemkhomedir --update
My sftp access did not work. Does it change the way to pass the login ?
I used to connect in sftp with userlogin / userpassword
//var/log/secure ://
/
/Jun 21 11:08:31 [localhost] sshd[17379]: Invalid user sftpuser from
x.x.x.x port 50187//
//Jun 21 11:08:31 [localhost] sshd[17379]: input_userauth_request:
invalid user sftpuser [preauth]//
//Jun 21 11:08:31 [localhost] sshd[17379]: pam_unix(sshd:auth): check
pass; user unknown//
//Jun 21 11:08:31 [localhost] sshd[17379]: pam_unix(sshd:auth):
authenticatio...