Date: Wed, 9 Jun 2004 05:03:02 -0700 (PDT) From: Doug Barton <DougB@FreeBSD.org> To: "Crist J. Clark" <cjc@FreeBSD.org> Cc: Dan Rue <drue@therub.org> Subject: Re: [Freebsd-security] Re: Multi-User Security Message-ID: <20040609050217.Q5839@ync.qbhto.arg> In-Reply-To: <20040607204149.GC75747@blossom.cjclark.org> References: <20040518160517.GA10067@therub.org> <OPEPILILPLAKPFCNKOKAGEGHCBAA.remko@elvandar.org> <20040606233720.F1850@ync.qbhto.arg> <20040607204149.GC75747@blossom.cjclark.org>
next in thread | previous in thread | raw e-mail | index | archive | help
On Mon, 7 Jun 2004, Crist J. Clark wrote: > On Sun, Jun 06, 2004 at 11:38:55PM -0700, Doug Barton wrote: >> On Wed, 19 May 2004, Dan Rue wrote: >> >>> You obviously havn't tried to chroot scponly users.. _that's_ the tricky >>> part. Especially if you want it to scale up beyond a handful of users. >>> If i'm wrong - fill me in i'd love to hear how to do it. >> >> Have you considered using ~/.ssh/authorized_keys to restrict the account >> from tty access? This would allow you to do commands (like scp) without >> the risk of the user getting an actual shell. > > $ ssh host /bin/sh > > You don't need a tty to get an interactive shell. You can also enforce what commands the user can run to prevent this. Read sshd(8) for more information. Doug -- This .signature sanitized for your protection
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20040609050217.Q5839>