Sven;
tx again, for your reply...
my only interest is sftp - so maybe scponly/rssh is worth looking at
i've ruled out proftpd on the port 22 issues alone. so failing rssh, i
guess i'll just have to deal with added directory layers, and "stock"
openssh; though still toying with idea of mysecu
On Mon, Jan 06, 2014 at 03:47:59PM -0600, Bob Goldberg wrote:
> On Sat, Jan 4, 2014 at 7:26 AM, Sven Hoexter wrote:
>
> > I'm not sure how the OpenSSH implementation handles ACLs, maybe that's
> > an option but I did not test it.
>
>
> my first problem is successfully logging in with sftp-only
On Sat, Jan 4, 2014 at 7:26 AM, Sven Hoexter wrote:
> I'm not sure how the OpenSSH implementation handles ACLs, maybe that's
> an option but I did not test it.
my first problem is successfully logging in with sftp-only and chroot'ing
in place. AFAIK - ACL's would only come into play afterward.
[Please don't top post on this mailing list.]
On Sat, Jan 04, 2014 at 03:34:58PM +, Balint Szigeti wrote:
> Hello
>
> I'm so sorry to cite from a website but when I tried to send the
> link of the site I got a bounce error from lists.debian.
That is weird! I suggest it wasn't just a simple
Hello
I'm so sorry to cite from a website but when I tried to send the link of
the site I got a bounce error from lists.debian... so here is the site:
/This came up today where I needed to give secure file transfer to
customers. To complicate things I had to use an out-of-the-box RHEL6
syste
Match User user01
ChrootDirectory /home
ForceCommand internal-sftp
X11Forwarding no
AllowTcpForwarding no
Match User user02
ChrootDirectory /home
ForceCommand internal-sftp
X11Forwarding no
AllowTcpForwarding no
useradd -m user01 && useradd -m user02
chmod 300 /ho
Bob Goldberg wrote:
> trying to determine best solution for an SFTP server.
> vsftpd appears to be my current best choice
vsftpd is "Very Secure FTP Daemon". It does FTP well (cleartext passwords
notwithstanding). It doesn't do SFTP (file transfer over ssh).
> users must be chroot'ed to /hom
On 04/01/14 13:26, Sven Hoexter wrote:
On Fri, Jan 03, 2014 at 04:14:42PM -0600, Bob Goldberg wrote:
so my question now very simply becomes:
what do demanding admin's choose as a preferred SFTP server, that allows
chrooting WITH group "w" access
I'm not sure how the OpenSSH implementation
On Fri, Jan 03, 2014 at 04:14:42PM -0600, Bob Goldberg wrote:
> so my question now very simply becomes:
> what do demanding admin's choose as a preferred SFTP server, that allows
> chrooting WITH group "w" access
I'm not sure how the OpenSSH implementation handles ACLs, maybe that's
an optio
On 01/03/2014 05:14 PM, Bob Goldberg wrote:
> ADDENDUM:
> forget about vsftp - this package has NOTHING WHAT-SO-EVER to do with SFTP.
> WTH were they thinking when they named that package!?
>
Well, Very Secure FTP (vsftp) was initially released back in Feb of
2001. The sftp protocal does techni
ADDENDUM:
forget about vsftp - this package has NOTHING WHAT-SO-EVER to do with SFTP.
WTH were they thinking when they named that package!?
so my question now very simply becomes:
what do demanding admin's choose as a preferred SFTP server, that allows
chrooting WITH group "w" access
On Fr
trying to determine best solution for an SFTP server.
vsftpd appears to be my current best choice, mostly because it's
supported by the distribution; but i'm not sure it meets my needs.
I know mysecureshell meets my needs; but it's a sourceforge project, and
not directly supported by the deb
12 matches
Mail list logo