From owner-freebsd-questions@FreeBSD.ORG Thu Jan 29 01:23:28 2004 Return-Path: Delivered-To: freebsd-questions@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id C0C6716A4CE for ; Thu, 29 Jan 2004 01:23:28 -0800 (PST) Received: from mail.360is.com (mail.360is.com [217.199.177.133]) by mx1.FreeBSD.org (Postfix) with ESMTP id 1B35543D2F for ; Thu, 29 Jan 2004 01:23:27 -0800 (PST) (envelope-from mark@probably.co.uk) Received: from localhost (localhost.localdomain [127.0.0.1]) by mail.360is.com (Postfix) with ESMTP id 31F1ED0007; Thu, 29 Jan 2004 09:23:25 +0000 (GMT) Received: from mail.360is.com ([127.0.0.1]) by localhost (careful.360is.com [127.0.0.1]) (amavisd-new, port 10024) with LMTP id 01385-07; Thu, 29 Jan 2004 09:23:18 +0000 (GMT) Received: from mindless.probably.int (81-178-215-171.dsl.pipex.com [81.178.215.171]) (using SSLv3 with cipher RC4-MD5 (128/128 bits)) (No client certificate requested) by mail.360is.com (Postfix) with ESMTP id 2022BD0003; Thu, 29 Jan 2004 09:23:18 +0000 (GMT) From: Mark Phillips To: Hiren , FreeBSD-Questions Date: Thu, 29 Jan 2004 09:23:17 +0000 User-Agent: KMail/1.5.4 References: <1075323660.273.25.camel@fbtab.h3p.co.za> In-Reply-To: <1075323660.273.25.camel@fbtab.h3p.co.za> MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: 7bit Content-Disposition: inline Message-Id: <200401290923.17225.mark@probably.co.uk> X-Virus-Scanned: by amavisd-new at 360is.com Subject: Re: chrooting sshd for sftp X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 29 Jan 2004 09:23:28 -0000 On Wednesday 28 January 2004 9:01 pm, Hiren wrote: Hi Hiren, > i currently have users using sftp > i wanted to know how to chroot sshd since i wanted the users to see only > what is in there home dir's. If you only want them to be able to scp and not have a shell, try taking a look at "scponly". It's in ports (shells/scponly) Regards, --Mark