From owner-freebsd-questions@FreeBSD.ORG Sat Nov 13 18:56:36 2004 Return-Path: Delivered-To: freebsd-questions@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 5E23516A4CE for ; Sat, 13 Nov 2004 18:56:36 +0000 (GMT) Received: from smtp.infracaninophile.co.uk (ns0.infracaninophile.co.uk [81.2.69.218]) by mx1.FreeBSD.org (Postfix) with ESMTP id 8000543D3F for ; Sat, 13 Nov 2004 18:56:35 +0000 (GMT) (envelope-from m.seaman@infracaninophile.co.uk) Received: from happy-idiot-talk.infracaninophile.co.uk (localhost [IPv6:::1]) iADIuU2I097631 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sat, 13 Nov 2004 18:56:30 GMT (envelope-from matthew@happy-idiot-talk.infracaninophile.co.uk) Received: (from matthew@localhost)iADIuTSQ097630; Sat, 13 Nov 2004 18:56:29 GMT (envelope-from matthew) Date: Sat, 13 Nov 2004 18:56:29 +0000 From: Matthew Seaman To: Grant Peel Message-ID: <20041113185629.GD96895@happy-idiot-talk.infracaninophile.co.uk> Mail-Followup-To: Matthew Seaman , Grant Peel , freebsd-questions@freebsd.org References: <017301c4c98e$ba334e00$6401a8c0@GRANT> Mime-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha1; protocol="application/pgp-signature"; boundary="GpGaEY17fSl8rd50" Content-Disposition: inline In-Reply-To: <017301c4c98e$ba334e00$6401a8c0@GRANT> User-Agent: Mutt/1.4.2.1i X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-1.5.6 (smtp.infracaninophile.co.uk [IPv6:::1]); Sat, 13 Nov 2004 18:56:30 +0000 (GMT) X-Virus-Scanned: ClamAV 0.80/575/Sat Nov 6 01:03:53 2004 clamav-milter version 0.80j on smtp.infracaninophile.co.uk X-Virus-Status: Clean X-Spam-Status: No, score=-0.6 required=5.0 tests=ALL_TRUSTED,AWL,RAZOR2_CHECK, URIBL_SBL autolearn=ham version=3.0.1 X-Spam-Checker-Version: SpamAssassin 3.0.1 (2004-10-22) on happy-idiot-talk.infracaninophile.co.uk cc: freebsd-questions@freebsd.org Subject: Re: Putty - SSH access X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 13 Nov 2004 18:56:36 -0000 --GpGaEY17fSl8rd50 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Sat, Nov 13, 2004 at 09:40:31AM -0500, Grant Peel wrote: > I have a precious few clients that would like Secure Shell access=20 > reportedly to admin a number of text files and run a few command line app= s. >=20 > Is it possible to grant shell access and jail users to thier home dir=20 > without going to all the hastle of building a real FreeBSD jail? There's a patch for OpenSSH-3.5p1 at: http://majikal.dyn.dhs.org/projekts/openssh_chroot_patch/ It appears that this patch was going to be a big sourceforge project, http://sourceforge.net/projects/chrootssh/ but according to their CVS the files were all initially checked in two years ago, and bugger all has happened since. Use at your own risk. Batteries not included. Some assembly required. Google for 'openssh chroot patch' for more info. Cheers, Matthew --=20 Dr Matthew J Seaman MA, D.Phil. 26 The Paddocks Savill Way PGP: http://www.infracaninophile.co.uk/pgpkey Marlow Tel: +44 1628 476614 Bucks., SL7 1TH UK --GpGaEY17fSl8rd50 Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.2.6 (FreeBSD) iD8DBQFBlljdiD657aJF7eIRAq/rAJ9UTk9Hob8s5r7wyVDgkQhW/bEmTACfTBrz REA+O7u59GihxxxQ2xIm8Y4= =AN5C -----END PGP SIGNATURE----- --GpGaEY17fSl8rd50--