Displaying 20 results from an estimated 10000 matches similar to: "Feature request: allow chrooted directory writable by others"
2007 Sep 05
3
Chrooting SFTP over SSH2
Hi,
As per the subject line - if I look up setting up chroot jails for SFTP over
SSH2 I'm led to various Web sites and patches and also to a CentOS wiki page
dated 2005, but what's the 'best' or 'correct' way to set this up for Centos
4.5 and 5?
Thanks
2017 Sep 01
3
sftp/scp only without real users
Hi,
my goal: sftp/scp only access, without the need for linux users.
I want to provide 10 sftp/scp directories to 10 people. Let's call this
"virtual account"
I don't want to create linux users for each of them.
I would like to create one linux user (backup_user). In his
home-directory will be 10 directories. For each "virtual account" one
directory.
Every
2017 Feb 10
4
Disabling specific commands in sftp
Hi,
On CentOS 7 I?m trying to set up a chrooted SFTP server on which specific users can only read and write on specific folder. And I?d like to disable some commands, so the users can only do ?cd?, ?ls?, ?get? and ?put? (and disabling ?chgrp?, ?chmod?, ?chown?, ?df? etc ?). Is there a way to achieve it, natively or with using a third-party software ?
Alexandre MALDEME
Analyste d'exploitation
2023 Nov 12
3
restrict file transfer in rsync, scp, sftp?
I am supporting a site that allows members to upload release files. I
have inherited this site which was previously existing. The goal is
to allow members to file transfer to and from their project area for
release distribution but not to allow general shell access and not to
allow access to other parts of the system.
Currently rsync and old scp has been restricted using a restricted
shell
2015 May 02
2
sftp chroot requirements
Hi Damien,
Thank you. I read the rationale.
Just to summarize, a user writeable chroot target is considered
dangerous if:
1) the user has another way of gaining non-chrooted access to the system
2) is able to create hardlinks to setuid-binaries outside of the chroot tree
3) there are bugs somewhere that allow privilige escalation or remote
execution of other programs
While all these
2005 Dec 30
5
rssh: root privilege escalation flaw
Affected Software: rssh - all versions prior to 2.3.0
Vulnerability: local user privilege escalation
Severity: *CRITICAL*
Impact: local users can gain root access
Solution: Please upgrade to v2.3.1
Summary
-------
rssh is a restricted shell which allows a system administrator to
limit users' access to a system via SSH to scp, sftp, rsync, rdist,
and cvs. It also allows the system
2018 Jan 05
3
SFTP chroot: Writable root
On Fri, 2018-01-05 at 21:42 +1030, David Newall wrote:
> On 05/01/18 20:06, Jakub Jelen wrote:
> > if the confined user has write access to the chroot directory,
> > there are ways how to get out, gain privileges and or do other
> > nasty things.
>
> I'm not inexperienced with UNIX and unix-like operating systems (30+
> years), and I can't think what these
2014 May 19
3
using OpenSSH/SFTP to replace an FTP server securely
Hello Folks,
I'm trying to replace an FTP with several hundred users with something secure.
My requirements:
- transfers must be logged
- users should not have any access to other users' directories
- users should land in a writable directory
- users should be chrooted
I've been trying to get this working with OpenSSH and the internal SFTP server,
but it does not
2019 Jan 23
3
Status of SCP vulnerability
I worked on a proposal like this a few years back (including proof of
concept code).? I taught sftp to have an scp personality (closer to scp2
than scp), and it was rejected by the higher ups.? It may have been the
dual-personality issue, but I know the scp2 concept was also rejected at
the time as it was stated there should be one transfer tool.
But the only way to drag scp into this century
2011 Oct 07
2
Chroot in CentOS 5.* ?
Hello,
can I use chroot users in their home directories under centos 5.* using standard
packages ? How about chrooted sftp in centos 5.* ?
If I cannot - do I have to use centos 6.* ?
Regards
Przemek
----------------------------------------------------------------
Dom pod miastem lub mieszkanie w centrum znajdziesz wlasnie tu!
http://linkint.pl/f2a58
2012 Feb 07
3
Suggestion for openssh
Hi!
I do not know if it's the ideal place, but I'm sending some suggestion.
Always use openssh and its enormous features.
- I needed to create an environment with only sftp access and thus used:
- Match User suporte
ForceCommand / usr / lib / openssh / sftp-server
OK! It worked perfectly! But only sftp.
- Create an environment with only blocking the ssh, but scp and
2012 Nov 12
5
[Bug 2048] New: Make chrooted sftp more user friendly using bind mount (solution suggested)
https://bugzilla.mindrot.org/show_bug.cgi?id=2048
Priority: P5
Bug ID: 2048
Assignee: unassigned-bugs at mindrot.org
Summary: Make chrooted sftp more user friendly using bind mount
(solution suggested)
Severity: enhancement
Classification: Unclassified
OS: Linux
Reporter: harviecz at gmail.com
2010 Feb 03
5
OpenSSH-5.3p1 selinux problem on CentOS-5.4.
Note: I am digest subscriber so if you could copy me directly on any
reply to the list I would appreciate it very much.
I sent this to the OpenSSH list (secureshell at securityfocus.com)
yesterday and received no response so I am asking here in hopes that
someone else has run across this problem on CentOS.
We have encountered a situation that requires sftp access to one of
our server by an
2004 Oct 23
1
rssh: pizzacode security alert
PIZZACODE SECURITY ALERT
program: rssh
risk: low[*]
problem: string format vulnerability in log.c
details:
rssh is a restricted shell for use with OpenSSH, allowing only scp
and/or sftp. For example, if you have a server which you only want to
allow users to copy files off of via scp, without providing shell
access, you can use rssh to do that. Additioanlly, running rsync,
rdist, and cvs are
2004 May 17
4
Multi-User Security
Hello list.
I would like to get your opinion on what is a safe multi-user environment.
The scenario:
We would like to offer to some customers of ours some sort of network
backup/archive. They would put daily or weekly backups from their local
machine on our server using rsync and SSH. Therefore, they all have a user
account on our server. However, we must ensure that they would absolutely
not be
2018 Jan 04
2
SFTP chroot: Writable root
(this is the third try. In the previous mails the body was empty)
Hi,
I set up a chroot sftp server by following this guide:
https://wiki.archlinux.org/index.php/SFTP_chroot
Things work well, with one exception:
The root directory is not writable.
The above docs give a hint how to work around this.
But this is just a work-around.
In my context I need a writable (ch)root directory.
2011 Mar 27
1
rssh / scponly
List,
I am putting together a sftp server and would like to use a restrictive
shell with a chroot jail. I was wondering what members of the list
thought about rssh as opposed to scponly.
Greg Ennis
2002 Apr 12
3
Chrooted sftp, did you getting it working?
Le Jeudi 11 Avril 2002 21:09, m.ibarra at cdcixis-na.com a ?crit :
> I was curious to know if you had any luck in getting openssh's sftp
> server properly configured to allow chrooted sftp logins? I have had
> no success and need something quickly.
Dear Mike,
Unfortunately, I did not succeed to have it work.
I got in contact with James Dennis <jdennis at law.harvard.edu>, who
2013 Mar 13
2
Time zone for chrooted internal-sftp?
Hi,
A question regarding chroot, internal-sftp, and time zones: Is it possible to get the time stamps presented by the chrooted internal-sftp to always be aligned with the system global time zone setting?
What is the reason this not done by default, that is couldn't the chrooted internal-sftp inherit the time zone information from the SSH daemon?
/John
--
John Olsson
Ericsson AB
2019 Jan 23
3
sftp Vs scp
Damien,
Reading the various articles about
https://sintonen.fi/advisories/scp-client-multiple-vulnerabilities.txt have
caused me to question the wisdom of using scp. Your observation:
> Date: Tue, 22 Jan 2019 13:48:34 +1100 (AEDT)
> From: Damien Miller <djm at mindrot.org>
> Subject: Re: Status of SCP vulnerability
>
> "Don't use scp with untrusted