Probably the most robust thing would be to use file-system ACLs to
restrict users to the desired actions.

They could always try a "get" command, but it would fail if they tried
to download a file to which they lacked read permissions.

That would also have the advantage of working regardless of what means
they used to access the server - sftp, ssh, console, etc.

Regards
Mark

-----Original Message-----
From: m l
Sent: December 21, 2005 07:36
To: [email protected]
Subject: Restricting sftp commands

I've install OpenSSH_4.2p1 with RSSH on Solaris 10. It only accept
"sftp" . 
I block SSh and the others.
But the user still able to do commands like "chmod" "put" ,"get" 
etc......under sftp.
Is there any way, when the user is in sftp prompt, to limit him to only
use for example "PUT" command ?

Martin

"Do, Or do not. There is no try."  -YODA-



This email and any files transmitted with it are confidential and intended 
solely for the use of the individual or entity to whom they are addressed. If 
you have received this email in error please notify the system manager. This 
message contains confidential information and is intended only for the 
individual named. If you are not the named addressee you should not 
disseminate, distribute or copy this e-mail.

Reply via email to