Chroot environment setup: Difference between revisions
Jump to navigation
Jump to search
No edit summary |
No edit summary |
||
Line 16: | Line 16: | ||
Restart sshd | Restart sshd | ||
service ssh restart | service ssh restart | ||
or | |||
systemctl restart sshd.service | |||
Add a new group | Add a new group |
Latest revision as of 11:06, 6 September 2023
Setting up a chroot-environment:
Add this to /etc/ssh/sshd_config
:
#Subsystem sftp /usr/lib/openssh/sftp-server Subsystem sftp internal-sftp # Heiko was here and did https://linode.com/docs/tools-reference/tools/limiting-access-with-sftp-jails-on-debian-and-ubuntu/ Match Group filetransfer ChrootDirectory %h X11Forwarding no AllowTcpForwarding no ForceCommand internal-sftp
Restart sshd
service ssh restart
or
systemctl restart sshd.service
Add a new group
addgroup --system filetransfer
For each chrooted user:
usermod -G filetransfer username chown root:root /home/username chmod 755 /home/username
cd /home/username mkdir tmp chown username:filetransfer tmp