James Carlson wrote:
> Darren J Moffat writes:
>>      directory. However, with the plain SSH or the external SFTP
>>      implementation, one has to properly populate the chroot directory with
>>      (at least) a user's shell and all its shared libraries, the dynamic
>>      linker, and possibly terminal databases and devices like /dev/null etc.
> 
> That population task is tough enough to get right that we provide a
> script with ftpd (ftpconfig) that sets up a usable chroot anon ftp
> environment.  Would something like that be useful here?  (Perhaps not
> for internal-sftp, but rather for an ordinary user account being set
> up for chroot use.)

Maybe but I'd rather it wasn't part of this case.  The common case for 
SSH chroot is for SFTP and the use of the internal-sftp is the best 
solution for that.

chroot environments cause a significant patching/pkg update problem and 
I'd rather not encourage use of building those environments.

I suspect the script for ftpd would be sufficiently close to work for 
SSH anyway.

-- 
Darren J Moffat

Reply via email to