I run a sshd host solely to allow employees to tunnel secure
connections to our internal hosts. Some of which do not support
encrypted protocols. These connections are chroot'ed via the
following in /etc/ssh/sshd_config
Match Group !wheel,!xx,y
AllowTcpForwarding yes
James,
I don't have an answer, but you'll note that I replied to both the
CentOS list, and the more appropriate selinux list. Folks like Dan
Walsh are responders there.
mark
James B. Byrne wrote:
> I run a sshd host solely to allow employees to tunnel secure
> connections to our
> On Oct 9, 2015, at 7:58 AM, James B. Byrne wrote:
>
> allow syslogd_t user_home_t:dir write;
>
The easiest way to fix this would be to use chcon to change the file context of
the syslog socket in the chroot directory to be like the main /dev/log, and any
log files
3 matches
Mail list logo