Julien Wajsberg <[EMAIL PROTECTED]> writes:

> Another simple way is to use some features of SSH and the authorized_keys
> file.
> 
> You can use the  � command="command" � option of this file
> (see man 8 sshd for more information)
> 
> man's extract:
>      command="command"
>              Specifies that the command is executed whenever this key is
> used
>              for authentication.  The command supplied by the user (if any)
> is
>              ignored.
> 
> 
> Hope this helps :)

Yup, you just need to make sure that sftp or scp or rcp or tftp or ftp
(or some other method of updating their file) to the user whack their
.ssh/authorized_keys file which would let them subvert the security of
using command="cvs" (or whatever you allow).

        Enjoy!
        -- Mark


_______________________________________________
Info-cvs mailing list
[EMAIL PROTECTED]
http://mail.gnu.org/mailman/listinfo/info-cvs

Reply via email to