in /etc/ftpaccess add a line like
restricted-uid username1 username2 username3
this will make users that logs in with their username listed in the line
above, kept inside their home directory.
they will not be able to cd into other directories of the system, only
their own home-dir and whats below.
At 13:53 31.05.2001 -0700, Alvin Oga wrote:
>hi ya John
>
>remove "real" from /etc/ftpaccess and that will make it only
>an anonymous ftp server
>
>if you wanna deny secure ftp connections to some....its easier to
>only allow secure ssh ( secure ftp) connections to only certain folks
>listed in your ssh config files
>
>c ya
>alvin
>
>
>On Thu, 31 May 2001, John R. Daily wrote:
>
> > At (time_t)991319743 ray p wrote:
> >
> > > You might want to see if using scp or sftp under ssh does what you
> need it
> > > do. Very powerful and very secure tool. Better then any ftp package
> > > out there imo.
> >
> > I haven't tried this as a secure ftp solution for a few years, but one
> > significant problem I encountered was the inability to prevent users
> > from logging into the server.
> >
> > The best I could do was give them a restricted shell in a chroot'ed
> > environment, and even that required some custom programming.
> >
>
>
>--
>To UNSUBSCRIBE, email to [EMAIL PROTECTED]
>with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
Reidar Krogstad
tlf +47 959 45 444
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]