Displaying 6 results from an estimated 6 matches for "skiparg".
Did you mean:
skiprg
2010 Jan 04
3
[Bug 430] Could add option to sftp-server to disable write access
https://bugzilla.mindrot.org/show_bug.cgi?id=430
--- Comment #6 from Damien Miller <djm at mindrot.org> 2010-01-04 14:00:26 EST ---
Created an attachment (id=1763)
--> (https://bugzilla.mindrot.org/attachment.cgi?id=1763)
/home/djm/sftp-ro.diff
Adds a -R commandline option to disable writes and other filesystem-
modifying options.
--
Configure bugmail:
2013 Jun 04
1
[PATCH] add restricted mode to sftp-server
Hello.
These patches add a new mode of operation for the sftp server.
It is located between the ordinary, unrestricted mode and read-only mode.
It allows you to add files to the server, but only if these files do
not exist on the server before.
Changes to existing files - are prohibited.
Please review them, maybe these patches will be useful not only to me.
Thank you.
-------------- next part
2006 Oct 09
1
About sftp-server root path
Hi,
I saw in archive that some people made a patch to sftp-server, and that patch
sets a root path.
I'd like to know if there's an ideia to apply that patch in main tree of
openssh?
With the use of SSHFS [wich uses sftp-server], it would be interesting to
have someting like that, because as we have netboot workstations, the access
to devices [such as, floppy, cdrom and usb data] are
2014 Jan 01
0
Soft chroot jail for sftp-server
...2,1363
> oldpath = jail_to_actual(oldpath);
> newpath = jail_to_actual(newpath);
1198a1384
> path = jail_to_actual(path);
1235a1422,1423
> oldpath = jail_to_actual(oldpath);
> newpath = jail_to_actual(newpath);
1406a1595
> jail = NULL;
1414d1602
<
1417c1605
< while (!skipargs && (ch = getopt(argc, argv, "d:f:l:u:cehR")) != -1) {
---
> while (!skipargs && (ch = getopt(argc, argv, "d:f:l:u:j:cehR")) != -1) {
1455a1644,1657
> case 'j':
> if (strlen(optarg) > 0 && *optarg == '/')
> jail =...
2007 Jun 18
0
[PATCH] sftp-server argument error handling
...2007
+++ sftp-server.c Mon Jun 18 16:39:14 2007
@@ -1220,7 +1220,8 @@
sanitise_stdfd();
__progname = ssh_get_progname(argv[0]);
- log_init(__progname, log_level, log_facility, log_stderr);
+ /* Send any argument errors to stderr */
+ log_init(__progname, log_level, log_facility, 1);
while (!skipargs && (ch = getopt(argc, argv, "C:f:l:che")) != -1) {
switch (ch) {
@@ -1237,12 +1238,12 @@
case 'l':
log_level = log_level_number(optarg);
if (log_level == SYSLOG_LEVEL_NOT_SET)
- error("Invalid log level \"%s\"", optarg);
+ fatal(&qu...
2007 Nov 11
1
ftp-server patch - restrict user to directory
...SyslogFacility log_facility = SYSLOG_FACILITY_AUTH;
char *cp, buf[4*4096];
+ int config_file_mandatory = 0;
extern char *optarg;
extern char *__progname;
@@ -1225,7 +1406,7 @@
__progname = ssh_get_progname(argv[0]);
log_init(__progname, log_level, log_facility, log_stderr);
- while (!skipargs && (ch = getopt(argc, argv, "C:f:l:che")) != -1) {
+ while (!skipargs && (ch = getopt(argc, argv, "C:f:F:l:che")) != -1) {
switch (ch) {
case 'c':
/*
@@ -1247,12 +1428,18 @@
if (log_level == SYSLOG_FACILITY_NOT_SET)
error("Invalid...