search for: skiparg

Displaying 6 results from an estimated 6 matches for "skiparg".

Did you mean: skiprg
2010 Jan 04
3
[Bug 430] Could add option to sftp-server to disable write access
https://bugzilla.mindrot.org/show_bug.cgi?id=430 --- Comment #6 from Damien Miller <djm at mindrot.org> 2010-01-04 14:00:26 EST --- Created an attachment (id=1763) --> (https://bugzilla.mindrot.org/attachment.cgi?id=1763) /home/djm/sftp-ro.diff Adds a -R commandline option to disable writes and other filesystem- modifying options. -- Configure bugmail:
2013 Jun 04
1
[PATCH] add restricted mode to sftp-server
Hello. These patches add a new mode of operation for the sftp server. It is located between the ordinary, unrestricted mode and read-only mode. It allows you to add files to the server, but only if these files do not exist on the server before. Changes to existing files - are prohibited. Please review them, maybe these patches will be useful not only to me. Thank you. -------------- next part
2006 Oct 09
1
About sftp-server root path
Hi, I saw in archive that some people made a patch to sftp-server, and that patch sets a root path. I'd like to know if there's an ideia to apply that patch in main tree of openssh? With the use of SSHFS [wich uses sftp-server], it would be interesting to have someting like that, because as we have netboot workstations, the access to devices [such as, floppy, cdrom and usb data] are
2014 Jan 01
0
Soft chroot jail for sftp-server
...2,1363 > oldpath = jail_to_actual(oldpath); > newpath = jail_to_actual(newpath); 1198a1384 > path = jail_to_actual(path); 1235a1422,1423 > oldpath = jail_to_actual(oldpath); > newpath = jail_to_actual(newpath); 1406a1595 > jail = NULL; 1414d1602 < 1417c1605 < while (!skipargs && (ch = getopt(argc, argv, "d:f:l:u:cehR")) != -1) { --- > while (!skipargs && (ch = getopt(argc, argv, "d:f:l:u:j:cehR")) != -1) { 1455a1644,1657 > case 'j': > if (strlen(optarg) > 0 && *optarg == '/') > jail =...
2007 Jun 18
0
[PATCH] sftp-server argument error handling
...2007 +++ sftp-server.c Mon Jun 18 16:39:14 2007 @@ -1220,7 +1220,8 @@ sanitise_stdfd(); __progname = ssh_get_progname(argv[0]); - log_init(__progname, log_level, log_facility, log_stderr); + /* Send any argument errors to stderr */ + log_init(__progname, log_level, log_facility, 1); while (!skipargs && (ch = getopt(argc, argv, "C:f:l:che")) != -1) { switch (ch) { @@ -1237,12 +1238,12 @@ case 'l': log_level = log_level_number(optarg); if (log_level == SYSLOG_LEVEL_NOT_SET) - error("Invalid log level \"%s\"", optarg); + fatal(&qu...
2007 Nov 11
1
ftp-server patch - restrict user to directory
...SyslogFacility log_facility = SYSLOG_FACILITY_AUTH; char *cp, buf[4*4096]; + int config_file_mandatory = 0; extern char *optarg; extern char *__progname; @@ -1225,7 +1406,7 @@ __progname = ssh_get_progname(argv[0]); log_init(__progname, log_level, log_facility, log_stderr); - while (!skipargs && (ch = getopt(argc, argv, "C:f:l:che")) != -1) { + while (!skipargs && (ch = getopt(argc, argv, "C:f:F:l:che")) != -1) { switch (ch) { case 'c': /* @@ -1247,12 +1428,18 @@ if (log_level == SYSLOG_FACILITY_NOT_SET) error("Invalid...