I recently compiled/installed openssh version OpenSSH_5.0p1.  I'm trying to 
make use of the ChrootDirectory to restrict a particular user to only be able 
to use sftp and in their homedir.  From what I've read, I should be able to 
accomplish this by adding something like this to the sshd_config:

Match user jsmith
    ForceCommand internal-sftp
    ChrootDirectory /space/storage/jsmith

I created user jsmith, with his homedir being /space/storage/jsmith.

I restarted sshd.

When I try to connect as that user, the following is returned:

Connection to 10.2.2.135 closed by remote host.
Connection to 10.2.2.135 closed.

The sshd log has an entry:
Jul  9 21:31:12 happybox sshd[8741]: [ID 800047 local5.crit] fatal: bad 
ownership or modes for chroot directory "/space/storage/jsmith"

The permissions of /space/storage/jsmith seem ok:

drwxr-xr-x   3 jsmith   other        512 Jul  9 21:19 jsmith

The .ssh directory is 700, just like my other users (and myself) who can 
connect normal.

I thought maybe the "ForceCommand internal-sftp" was giving me problems, so I 
removed that from the sshd_config to see if I could simply make this user have 
a shell account chroot'd to his homedir.  But, the same error was returned.

If I remove the entries from the sshd_config file, the user can connect fine, 
but not chrooted.

Are there some specific permissions or entries in my sshd_config that I'm 
missing?
Any help would be great.

Thanks!



      

Reply via email to