recently i've worked on a small patch for openssh that chroots a user when
he logs in. it uses mysql for password auth. it is not posted anyware but
if you want it, send me a personal mail.


           Ivan Dimitrov
        System Administrator
          Bastun Networks

On Fri, 26 Oct 2001, Javier [iso-8859-1] Fernández-Sanguino Peña wrote:

> I have been asked for this and I was trying to figure out how to do it
> (would document it later on in the Securing-Debian-Manual). So please,
> excuse me if you feel this is off-topic.
>
> The problem is, how can an admin restrict remote access from a given user
> (through telnet and/or sshd) in order to limit his "moves" inside the
> operating system.
>
> Chrooting the daemon is a possibility, but it's not tailored in a per-user
> basis but globally to all users (besides you need all the tools that users
> might want to use in the jail). I'm looking more into a jailed enviroment
> like proftpd's when you sed "DefaultRoot ~" (jails the user into his home
> directory but he's able to use all commands, without having to setup all
> the libraries in it).
>
> AFAIK, pam only allows to limit some user accesses (cores, memory
> limits..) not users "movement" in the OS
>
>       Ideas?
>
>       Regards
>
>       Javi
>
>
> --
> To UNSUBSCRIBE, email to [EMAIL PROTECTED]
> with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]
>


--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to