Julien Wajsberg <[EMAIL PROTECTED]> writes:
> Another simple way is to use some features of SSH and the authorized_keys
> file.
>
> You can use the � command="command" � option of this file
> (see man 8 sshd for more information)
>
> man's extract:
> command="command"
> Specifies that the command is executed whenever this key is
> used
> for authentication. The command supplied by the user (if any)
> is
> ignored.
>
>
> Hope this helps :)
Yup, you just need to make sure that sftp or scp or rcp or tftp or ftp
(or some other method of updating their file) to the user whack their
.ssh/authorized_keys file which would let them subvert the security of
using command="cvs" (or whatever you allow).
Enjoy!
-- Mark
_______________________________________________
Info-cvs mailing list
[EMAIL PROTECTED]
http://mail.gnu.org/mailman/listinfo/info-cvs