Hello Rico,

Friday, April 27, 2007, 2:25:59 PM, you wrote:

>> I don't know if it is a good idea or not, but I read about
>> this patch yesterday and at first, I was pretty excited. I
>> have been handed the requirement to move an FTP server to
>> "something" more secure.  All the other requirements that 
>> have been given to me for this have very strongly pointed
>> right to SSH/SFTP.  However, I have yet to figure out how
>> to chroot users into their home folders with SFTP and that
>> is unfortuneately what the boss wants.  If someone knows
>> how to do this without patches like these Please let me 
>> know.  Otherwise, I will have to keep looking.  I certianly
>> know enough from lurking on this list to know that if there
>> are this many people on the list opposed to something there
>> has got to be something wrong with it and I don't want it.
>> 
>> No patch for me please!

  We  are  using  the chrootssh.sourceforge.net for our production ftp/sftp
server.   For   an   additional  security  we  set  sftp  users  shell  to
/usr/libexec/openssh/sftp-server. I consider that patch as "semi-official".
But it sounds like you don't want *any* patches.
  You  can  use a commercial ssh - they have chroot feature (similar to the
chrootssh).
  You  can also use ftp over ssh2 (we also use it). ssh does encryption and
authentication, ftp - speed (it's faster than sftp) and chroot. You'll just
need  to set up ssh to listen out and ftp - on the localhost only. Downside
is  that  I  haven't  heard about free client supporting it. But if you can
afford  to  buy something like www.vandyke.com/products/securefx/index.html
for every user (or force them to buy it) - this solution is for you.

-- 
Best regards,
 Boris                            mailto:[EMAIL PROTECTED]

Reply via email to