From owner-freebsd-security@FreeBSD.ORG Fri Jan 14 01:43:50 2005 Return-Path: Delivered-To: freebsd-security@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 1D4C916A4CE for ; Fri, 14 Jan 2005 01:43:50 +0000 (GMT) Received: from kathi.vvi.at (kathi.vvi.at [208.252.225.80]) by mx1.FreeBSD.org (Postfix) with ESMTP id D86A543D69 for ; Fri, 14 Jan 2005 01:43:49 +0000 (GMT) (envelope-from tech@vvi.at) Received: from [208.252.225.99] ([208.252.225.99]) (authenticated bits=0) by kathi.vvi.at (8.12.10/8.13.1) with ESMTP id j0E1lvN1089515 for ; Thu, 13 Jan 2005 17:47:58 -0800 (PST) (envelope-from tech@vvi.at) User-Agent: Microsoft-Entourage/10.1.6.040913.0 Date: Thu, 13 Jan 2005 17:43:47 -0800 From: vvi tech To: Message-ID: Mime-version: 1.0 Content-type: text/plain; charset="US-ASCII" Content-transfer-encoding: 7bit Subject: Equilivant for a sshchroot file? X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: Security issues [members-only posting] List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 14 Jan 2005 01:43:50 -0000 Hey guys I really have made use of the ftpchroot file in /etc but I wonder why is there no equivalent of that for ssh and telnet accounts? Basically simply limiting traversing the file system to specific shell users root. Regards, Jason