Hi Joseph,

I had the same problem.

The thing is that specyfying /space/storage/jsmith you are providing a
/ directory forr that user. You would want in this case specify
/space/storage as ChrootDirectory and then create
/space/storage/jsmith with 700 in it.

Hope that helps.

Cheers. Simon

2008/7/9 Joseph Spenner <[EMAIL PROTECTED]>:
> I recently compiled/installed openssh version OpenSSH_5.0p1.  I'm trying to 
> make use of the ChrootDirectory to restrict a particular user to only be able 
> to use sftp and in their homedir.  From what I've read, I should be able to 
> accomplish this by adding something like this to the sshd_config:
>
> Match user jsmith
>    ForceCommand internal-sftp
>    ChrootDirectory /space/storage/jsmith
>
> I created user jsmith, with his homedir being /space/storage/jsmith.
>
> I restarted sshd.
>
> When I try to connect as that user, the following is returned:
>
> Connection to 10.2.2.135 closed by remote host.
> Connection to 10.2.2.135 closed.
>
> The sshd log has an entry:
> Jul  9 21:31:12 happybox sshd[8741]: [ID 800047 local5.crit] fatal: bad 
> ownership or modes for chroot directory "/space/storage/jsmith"
>
> The permissions of /space/storage/jsmith seem ok:
>
> drwxr-xr-x   3 jsmith   other        512 Jul  9 21:19 jsmith
>
> The .ssh directory is 700, just like my other users (and myself) who can 
> connect normal.
>
> I thought maybe the "ForceCommand internal-sftp" was giving me problems, so I 
> removed that from the sshd_config to see if I could simply make this user 
> have a shell account chroot'd to his homedir.  But, the same error was 
> returned.
>
> If I remove the entries from the sshd_config file, the user can connect fine, 
> but not chrooted.
>
> Are there some specific permissions or entries in my sshd_config that I'm 
> missing?
> Any help would be great.
>
> Thanks!
>
>
>
>
>

Reply via email to