The user can change to directories above their home.
Is there a way to chroot them
Use restricted bash shell for the user (/bin/rbash) in the
/etc/passwd.
This does not seem to affect sshd. I changed a user to use rbash but I
could still go to a windows machine and use the putty
I think some of you misunderstood me. I was not clear about my
concern. Users can ssh into my machine but their profiles are fixed to
run a menu of things I allow them to do. Thus they can't get to the $
prompt and thus can't cd to other directories to see what's there. And
even they did,
On Mon, Apr 01, 2002 at 10:04:50AM -0300, Pedro Zorzenon Neto wrote:
With the following commands, you can copy files without scp:
$ cat localfile | ssh somehost cat /somedir/remotefile
$ ssh somehost cat /somedir/remotefile localfile
So, it seems unusefull to disable scp and enable
On Mon, Apr 01, 2002 at 10:35:35AM -0500, Jon McCain wrote:
All of this has gotten me to thinking about another flaw in the way I
have things set up. I'm preventing users from getting to a $ by running
a menu from their profile.
exec /usr/bin/menu
This works fine since the exec causes
On Mon, 2002-04-01 at 18:41, Jon McCain wrote:
Chris Reeves wrote:
Why not change the users' shell to /usr/bin/menu?
Because they need to be able to transfer files to their home
directories. If you do this, then ftp,pscp,etc won't work. My original
goal was to allow them transfer
On Mon, Apr 01, 2002 at 10:35:35AM -0500, Jon McCain wrote:
But changing permissions on the .bash_profile so they don't own it (and
not in their group) should take care of that problem. They can read it
all they want, just not change it.
A cleaner solution would be to make it immutable.
(as
On Mon, 01 Apr 2002 10:35:35 -0500, Jon McCain
[EMAIL PROTECTED] was runoured to have said:
All of this has gotten me to thinking about another flaw in the way I
have things set up. I'm preventing users from getting to a $ by running
a menu from their profile.
exec /usr/bin/menu
On Sat, Mar 30, 2002 at 10:24:28PM -0500, Jon McCain wrote:
I've been playing around with the scp and sftp components of putty and
noticed what I consider a security hole. Winscp does the same thing.
The user can change to directories above their home. Is there a way to
chroot them like you
The user can change to directories above their home.
Is there a way to chroot them
Use restricted bash shell for the user (/bin/rbash) in the
/etc/passwd.
This does not seem to affect sshd. I changed a user to use rbash but I
could still go to a windows machine and use the putty
I think some of you misunderstood me. I was not clear about my
concern. Users can ssh into my machine but their profiles are fixed to
run a menu of things I allow them to do. Thus they can't get to the $
prompt and thus can't cd to other directories to see what's there. And
even they did,
On Mon, Apr 01, 2002 at 10:04:50AM -0300, Pedro Zorzenon Neto wrote:
With the following commands, you can copy files without scp:
$ cat localfile | ssh somehost cat /somedir/remotefile
$ ssh somehost cat /somedir/remotefile localfile
So, it seems unusefull to disable scp and enable
All of this has gotten me to thinking about another flaw in the way I
have things set up. I'm preventing users from getting to a $ by running
a menu from their profile.
exec /usr/bin/menu
This works fine since the exec causes menu to become their shell
process.
But some smart user could get
On Mon, Apr 01, 2002 at 10:35:35AM -0500, Jon McCain wrote:
All of this has gotten me to thinking about another flaw in the way I
have things set up. I'm preventing users from getting to a $ by running
a menu from their profile.
exec /usr/bin/menu
This works fine since the exec causes
Chris Reeves wrote:
Why not change the users' shell to /usr/bin/menu?
Because they need to be able to transfer files to their home
directories. If you do this, then ftp,pscp,etc won't work. My original
goal was to allow them transfer files to/from home directory with
something besides ftp
On Mon, 2002-04-01 at 18:41, Jon McCain wrote:
Chris Reeves wrote:
Why not change the users' shell to /usr/bin/menu?
Because they need to be able to transfer files to their home
directories. If you do this, then ftp,pscp,etc won't work. My original
goal was to allow them transfer
On Mon, Apr 01, 2002 at 10:35:35AM -0500, Jon McCain wrote:
But changing permissions on the .bash_profile so they don't own it (and
not in their group) should take care of that problem. They can read it
all they want, just not change it.
A cleaner solution would be to make it immutable.
(as
On Mon, 01 Apr 2002 10:35:35 -0500, Jon McCain
[EMAIL PROTECTED] was runoured to have said:
All of this has gotten me to thinking about another flaw in the way I
have things set up. I'm preventing users from getting to a $ by running
a menu from their profile.
exec /usr/bin/menu
the commercial ssh server has an option to chroot to a user's home
directory. there are patches available to openssh to do it also,
though i don't know if they've been thoroughly audited. check out
http://mail.incredimail.com/howto/openssh/
you can make sftp-server the user's shell to only
On Sun, 2002-03-31 at 05:24, Jon McCain wrote:
I've been playing around with the scp and sftp components of putty and
noticed what I consider a security hole. Winscp does the same thing.
The user can change to directories above their home. Is there a way to
chroot them like you can in an
On Sat, Mar 30, 2002 at 10:24:28PM -0500, Jon McCain wrote:
I've been playing around with the scp and sftp components of putty and
noticed what I consider a security hole. Winscp does the same thing.
The user can change to directories above their home. Is there a way to
chroot them like
I've been playing around with the scp and sftp components of putty
and
noticed what I consider a security hole. Winscp does the same thing.
The user can change to directories above their home. Is there a way
to
chroot them like you can in an ftp config file?
scp is merely a way to use a
- Original Message -
From: Jon McCain
Sent: Sunday, March 31, 2002 8:54 AM
The user can change to directories above their home.
Is there a way to chroot them
Use restricted bash shell for the user (/bin/rbash) in the
/etc/passwd.
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with
the commercial ssh server has an option to chroot to a user's home
directory. there are patches available to openssh to do it also,
though i don't know if they've been thoroughly audited. check out
http://mail.incredimail.com/howto/openssh/
you can make sftp-server the user's shell to only allow
On Sun, 2002-03-31 at 05:24, Jon McCain wrote:
I've been playing around with the scp and sftp components of putty and
noticed what I consider a security hole. Winscp does the same thing.
The user can change to directories above their home. Is there a way to
chroot them like you can in an
On Sat, Mar 30, 2002 at 10:24:28PM -0500, Jon McCain wrote:
I've been playing around with the scp and sftp components of putty and
noticed what I consider a security hole. Winscp does the same thing.
The user can change to directories above their home. Is there a way to
chroot them like you
I've been playing around with the scp and sftp components of putty
and
noticed what I consider a security hole. Winscp does the same thing.
The user can change to directories above their home. Is there a way
to
chroot them like you can in an ftp config file?
scp is merely a way to use a
- Original Message -
From: Jon McCain
Sent: Sunday, March 31, 2002 8:54 AM
The user can change to directories above their home.
Is there a way to chroot them
Use restricted bash shell for the user (/bin/rbash) in the
/etc/passwd.
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a
Jon McCain [EMAIL PROTECTED] cum veritate scripsit:
I've been playing around with the scp and sftp components of putty and
noticed what I consider a security hole. Winscp does the same thing.
The user can change to directories above their home. Is there a way to
chroot them like you can
hi ya
i'd do it with automounter w/ ssh ???
mount remote:/home/httpd/html /mnt/html
scp /home/user/new_site.html /mnt/html
sync
umount /mnt/html
mount is not needed if it is configured to auotmount
and user does NOT need shell account on the remote web server
you also cannot cd / on the
Jon McCain [EMAIL PROTECTED] cum veritate scripsit:
I've been playing around with the scp and sftp components of putty and
noticed what I consider a security hole. Winscp does the same thing.
The user can change to directories above their home. Is there a way to
chroot them like you can in
hi ya
i'd do it with automounter w/ ssh ???
mount remote:/home/httpd/html /mnt/html
scp /home/user/new_site.html /mnt/html
sync
umount /mnt/html
mount is not needed if it is configured to auotmount
and user does NOT need shell account on the remote web server
you also cannot cd / on the
31 matches
Mail list logo