OpenSSH : SFTP only + Chroot2021/07/19 |
Configure SFTP only + Chroot.
Some users who are applied this setting can access only with SFTP and also applied chroot directory. |
|
[1] | For example, Set [/home] as the Chroot directory. |
[root@dlp ~]#
vi /etc/ssh/sshd_config # line 138 : comment out and add a line #Subsystem sftp /usr/libexec/openssh/sftp-server Subsystem sftp internal-sftp # add to the end
Match Group sftp_users
X11Forwarding no AllowTcpForwarding no ChrootDirectory /home ForceCommand internal-sftp
[root@dlp ~]#
systemctl restart sshd # for example, set [rocky] user as SFTP only user [root@dlp ~]# usermod -aG sftp_users rocky |
[2] | Verify working with a user set SFTP only setting. |
[rocky@node01 ~]$
[rocky@node01 ~]$ ssh dlp.srv.world Enter passphrase for key '/home/rocky/.ssh/id_rsa': This service allows sftp connections only. Connection to dlp.srv.world closed. # denied normally
sftp dlp.srv.world Enter passphrase for key '/home/rocky/.ssh/id_rsa': Connected to dlp.srv.world. sftp> ls -l drwx------ 3 rocky rocky 111 Jul 16 06:06 rockysftp> pwd Remote working directory: / sftp> exit |
Sponsored Link |
|