



Yes, that is correct but it requires specialized server and client. The normal mode (as far as I know) is to encrypt only the command channel.magic919 wrote:Worth adding that FTPS can encrypt the data channel too.
Code: Select all
Match Group ftpusers
X11Forwarding no
AllowTcpForwarding no
ChrootDirectory /var/ftpincoming
ForceCommand internal-sftp
i got an error on the client: sftp is not supportedmalern wrote:The latest version of OpenSSH can do restricted sftp by itself without needing any patches or things like scponly
I've set it up on my machine by adding the following to /etc/ssh/sshd_configBasically it restricts all users in the "ftpusers" group to sftp only (i.e. no real shell access or forwarding), and chroots them in the /var/ftpincoming dir. You'd have to create the group and dir first, but nothing else is needed.Code: Select all
Match Group ftpusers X11Forwarding no AllowTcpForwarding no ChrootDirectory /var/ftpincoming ForceCommand internal-sftp

Please do not abreviate error messages.ZuckBin wrote:hi
----- 8< Snipp! Snipp! >8 -----
i got an error on the client: sftp is not supported
How to resolve this
Thanks
Slightly off-topic, but this comes close to something I'd like to do.malern wrote:The latest version of OpenSSH can do restricted sftp by itself without needing any patches or things like scponly
I've set it up on my machine by adding the following to /etc/ssh/sshd_configBasically it restricts all users in the "ftpusers" group to sftp only (i.e. no real shell access or forwarding), and chroots them in the /var/ftpincoming dir. You'd have to create the group and dir first, but nothing else is needed.Code: Select all
Match Group ftpusers X11Forwarding no AllowTcpForwarding no ChrootDirectory /var/ftpincoming ForceCommand internal-sftp
What I use is;depontius wrote:I'd like to use an account for TcpForwarding ONLY, no shell, no sftp. I've tried several ways to do this, without luck, though I have limited time. Do you already know how to do such a thing?
Code: Select all
Match User tunnel
X11Forwarding no
AllowTcpForwarding yes
ForceCommand /sbin/nologin