Displaying 20 results from an estimated 8000 matches similar to: "vulnerabilities in scponly"
2005 Jan 15
0
rssh and scponly arbitrary command execution
I just released rssh version 2.2.3 to fix the problem detailed below.
I haven't had time to update my website yet, and my Internet acess is
quite limited these days (hence the terse announcement), so I probably
won't get to that for a while. However, rssh 2.2.3 is available from
the sourceforge.net site:
http://sourceforge.net/projects/rssh
All users of rssh should update to the
2004 Oct 23
1
rssh: pizzacode security alert
PIZZACODE SECURITY ALERT
program: rssh
risk: low[*]
problem: string format vulnerability in log.c
details:
rssh is a restricted shell for use with OpenSSH, allowing only scp
and/or sftp. For example, if you have a server which you only want to
allow users to copy files off of via scp, without providing shell
access, you can use rssh to do that. Additioanlly, running rsync,
rdist, and cvs are
2004 Dec 03
1
[BUGTRAQ] rssh and scponly arbitrary command execution
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
[This came over BUGTRAQ this morning. Note the call for volunteers
vis-a-vis rssh.]
- ----- Forwarded message from Jason Wies <jason at xc.net> -----
List-Id: <bugtraq.list-id.securityfocus.com>
List-Subscribe: <mailto:bugtraq-subscribe at securityfocus.com>
To: bugtraq at securityfocus.com
Cc: rssh-discuss at
2005 Dec 30
5
rssh: root privilege escalation flaw
Affected Software: rssh - all versions prior to 2.3.0
Vulnerability: local user privilege escalation
Severity: *CRITICAL*
Impact: local users can gain root access
Solution: Please upgrade to v2.3.1
Summary
-------
rssh is a restricted shell which allows a system administrator to
limit users' access to a system via SSH to scp, sftp, rsync, rdist,
and cvs. It also allows the system
2011 Mar 27
1
rssh / scponly
List,
I am putting together a sftp server and would like to use a restrictive
shell with a chroot jail. I was wondering what members of the list
thought about rssh as opposed to scponly.
Greg Ennis
2007 Sep 05
3
Chrooting SFTP over SSH2
Hi,
As per the subject line - if I look up setting up chroot jails for SFTP over
SSH2 I'm led to various Web sites and patches and also to a CentOS wiki page
dated 2005, but what's the 'best' or 'correct' way to set this up for Centos
4.5 and 5?
Thanks
2019 Jan 23
3
Status of SCP vulnerability
I worked on a proposal like this a few years back (including proof of
concept code).? I taught sftp to have an scp personality (closer to scp2
than scp), and it was rejected by the higher ups.? It may have been the
dual-personality issue, but I know the scp2 concept was also rejected at
the time as it was stated there should be one transfer tool.
But the only way to drag scp into this century
2008 Oct 05
4
Why is -e sent to the remote rsync side?
> $ rsync -e 'ssh -v' lingnu.com:
> OpenSSH_5.1p1 Debian-2, OpenSSL 0.9.8g 19 Oct 2007
> debug1: Reading configuration data /etc/ssh/ssh_config
> debug1: Applying options for *
> debug1: Connecting to lingnu.com [199.203.56.105] port 22.
> debug1: Connection established.
...
> debug1: Sending command: rsync --server --sender -de.L .
As we can see, rsync runs ssh, and
2003 Dec 31
2
chroot + ssh concerns
Hello,
I'm new to the list, but hopefully I've done enough digging around that
I don't get yelled at too terribly ;)
We're looking to implement a chrooted environment for allowing users to
scp files from servers. That's basically the only functionality that
we need in this case. We're looking to chroot the user and/or remove
any chance that the account can login via
2012 Feb 07
3
Suggestion for openssh
Hi!
I do not know if it's the ideal place, but I'm sending some suggestion.
Always use openssh and its enormous features.
- I needed to create an environment with only sftp access and thus used:
- Match User suporte
ForceCommand / usr / lib / openssh / sftp-server
OK! It worked perfectly! But only sftp.
- Create an environment with only blocking the ssh, but scp and
2017 Feb 10
4
Disabling specific commands in sftp
Hi,
On CentOS 7 I?m trying to set up a chrooted SFTP server on which specific users can only read and write on specific folder. And I?d like to disable some commands, so the users can only do ?cd?, ?ls?, ?get? and ?put? (and disabling ?chgrp?, ?chmod?, ?chown?, ?df? etc ?). Is there a way to achieve it, natively or with using a third-party software ?
Alexandre MALDEME
Analyste d'exploitation
2008 Dec 09
2
Feature request: AlwaysDenyLogin, LoginDelayTime
Please consider adding the following features to sshd:
1. AlwaysDenyLogin - a setting that will result in always denying
login regardless of the credentials given by the client.
2. LoginDelayTime - to specify a delay in milliseconds before the
server responds to a client's login attempt.
These would help to employ brute force bots.
Regards
2003 Jul 07
0
[semi-OT] rssh FINAL RELEASE! Well, hopefully.
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
I'm pleased to announce that rssh now has per-user configurations!
Today I released rssh v2.1.0 with that last peice of functionality to
be added, bringing active development of rssh to a close.
Additionally, I spent several hours testing and debugging this release
as thoroughly as I could think to, and I'm pleased to report (tongue
in cheek)
2003 Jul 02
0
[semi-OT] rssh
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
I released rssh v2.0.4 today. It fixes bugs in the parser which
affect quoted arguments in the config file, as well as the code which
builds the vector for the arguments to the exec call. In the latter
case, arguments which contain a space were treated as two sepearate
args. The man page was also updated to include information about
quoting values
2003 Jan 02
0
rssh 1.0.4 released
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Hi folks,
Today I released rssh 1.0.4. rssh is a small replacement shell that
provides the ability for system administrators to give specific users
access to a given system via scp or sftp only.
For downloads or more information, visit the rssh homepage:
http://www.pizzashack.org/rssh
This release fixes a stupid bug caused by a failure to
2004 Jun 19
0
security flaw in rssh
rssh is a small shell whose purpose is to restrict users to using scp
or sftp, and also provides the facilities to place users in a chroot
jail. It can also be used to lock users out of a system completely.
William F. McCaw identified a minor security flaw in rssh when used
with chroot jails.
There is a bug in rssh 2.0 - 2.1.x which allows a user to gather
information outside of a chrooted jail
2008 Jun 07
2
Chroot'ed SSH
Hi,
Is anyone chrooting users that connect through SSH?
I looked for it on Google and I basically saw several methods:
- OpenSSH 5 supports ChrootDirectory (FC9 apparently has RPMs that
probably could be rebuilt under CentOS 5)
- There seem to be several patches for OpenSSH 4.x to do the chroot,
the most popular seems to be http://chrootssh.sf.net/
- There appears to be a pam_chroot
- There are
2023 Dec 07
3
Non-shell accounts and scp/sftp
Hi,
We have a CLI that certain users get dropped into when they log in. One of the things they can go is generate certificates (actually .p12 key/certificate bundles) that they will then scp out of the box from another host.
Problem is that if their default shell isn't sh, ash, dash, bash, zsh, etc. then things break. Is there a workaround to allow scp/sftp to continue to work even for
2010 Apr 13
3
[Bug 1755] New: Broken pipe with scponly with debuglevel
https://bugzilla.mindrot.org/show_bug.cgi?id=1755
Summary: Broken pipe with scponly with debuglevel
Product: Portable OpenSSH
Version: 5.4p1
Platform: All
OS/Version: Linux
Status: NEW
Severity: normal
Priority: P2
Component: sftp-server
AssignedTo: unassigned-bugs at mindrot.org
2006 Jan 12
4
Granting SSH access to a Ruby on Rails user
I installed Rails and Rubygems on a web server for a customer who wants
to install a Ruby on Rails application that he developped.
He needs SSH access to interact with Ruby, so I''ll have to grant him
access, but I want him to only play around in his /home directory, as
this server also hosts other customers. How could I do that?
Thanks,
--
Posted via http://www.ruby-forum.com/.