Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 25 Apr 2008 16:41:07 +0000 (UTC)
From:      D Hill <d.hill@yournetplus.com>
To:        Chuck Swiger <cswiger@mac.com>
Cc:        Geert Geurts <begeert@gmail.com>, freebsd-questions@freebsd.org
Subject:   Re: restrict ssh access
Message-ID:  <alpine.BSF.1.10.0804251635570.60886@duane.dbq.yournetplus.com>
In-Reply-To: <BCBF8C55-3A54-4DA7-AC76-32A217EFB4FB@mac.com>
References:  <1209131161.14700.4.camel@puk> <BCBF8C55-3A54-4DA7-AC76-32A217EFB4FB@mac.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On Fri, 25 Apr 2008 at 09:30 -0700, cswiger@mac.com confabulated:

> On Apr 25, 2008, at 6:46 AM, Geert Geurts wrote:
>> I've got a server running a ssh server, I want to enable ssh for the use
>> of sftp by a group of users, and limit their ssh access to just allow
>> running passwd so they can change their default password. What whould be
>> the best/easiest way to acomplish this, or something similiar?
>
> I wonder what would happen if you gave them a shell of "/usr/bin/passwd"...? 
> :-)

That should work. I just tested. When an ssh connection is made, it 
executes passwd. As soon as the password is changed, the ssh connection 
was closed:

   %ssh -l asdf 192.168.1.50
   Password:
   ...
   Changing local password for asdf
   Old Password:
   New Password:
   Retype New Password:
   Connection to 192.168.1.50 closed.




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?alpine.BSF.1.10.0804251635570.60886>