Op zaterdag 22 augustus 2015 heeft Roger Leigh rle...@codelibre.net het
volgende geschreven:
On 22/08/2015 15:01, Brandon Allbery wrote:
On Sat, Aug 22, 2015 at 10:54 AM, Rainer Duffner rai...@ultra-secure.de
wrote:
I found it’s much easier to have actual chroot’ed ssh users once the users
On Sat, Aug 22, 2015 at 9:32 AM, Johan Hendriks joh.hendr...@gmail.com
wrote:
Last login: Sat Aug 22 17:05:52 2015 from 192.168.1.13
Could not chdir to home directory /restricted/testuser1: No such file or
directory
Cannot read termcap database;
using dumb terminal settings.
%
From here I
Am 22.08.2015 um 15:45 schrieb Brandon Allbery allber...@gmail.com:
On Sat, Aug 22, 2015 at 9:32 AM, Johan Hendriks joh.hendr...@gmail.com
wrote:
chroot is what it says on the tin: once set, the specified directory is
/. Every file accessed from that point on MUST be available from a
Hello all.
I want to use the Chrootdirctory feature of openssh on FreeBSD 10.2 And
I tried it on 10.1 but gave up...
Whatever I do I can not make it work on 10 without error messages, but I
got it working on FreeBSD 8
This is what I have in my /etc/ssh/sshd_config file.
# Example of overriding
On Sat, Aug 22, 2015 at 10:54 AM, Rainer Duffner rai...@ultra-secure.de
wrote:
I found it’s much easier to have actual chroot’ed ssh users once the users
themselves are in an LDAP-directory.
Also, for doing anything useful on that shell, it turned out you need a
some more devices in /dev than
On 22/08/2015 15:01, Brandon Allbery wrote:
On Sat, Aug 22, 2015 at 10:54 AM, Rainer Duffner rai...@ultra-secure.de
wrote:
I found it’s much easier to have actual chroot’ed ssh users once the users
themselves are in an LDAP-directory.
Also, for doing anything useful on that shell, it turned