Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 20 Dec 2004 14:23:02 -0700
From:      Brett Glass <brett@lariat.org>
To:        freebsd-security@freebsd.org
Subject:   chroot-ing users coming in via SSH and/or SFTP?
Message-ID:  <6.2.0.14.2.20041220142255.06260ca0@localhost>

next in thread | raw e-mail | index | archive | help
A client wants me to set up a mechanism whereby his customers can drop files
securely into directories on his FreeBSD server; he also wants them to be
able to retrieve files if needed. The server is already running OpenSSH,
and he himself is using Windows clients (TeraTerm and WinSCP) to access it,
so the logical thing to do seems to be to have his clients send and receive
files via SFTP or SCP. 

The users depositing files on the server shouldn't be allowed to see what
one another are doing or to grope around on the system, so it'd be a good
idea to chroot them into home directories, as is commonly done with FTP.

However, OpenSSH (or at least FreeBSD's version of it) doesn't seem to have a
mechanism that allows users doing SSH, SCP, or SFTP to be chroot-ed into a 
specific directory. What is the most effective and elegant way to do this? I've 
seen some crude patches that allow you to put a /. in the home directory specified
in /etc/passwd, but these are specific to versions of the "portable" OpenSSH
and none of the diffs seem to match FreeBSD's files exactly. 

--Brett



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?6.2.0.14.2.20041220142255.06260ca0>