-
Notifications
You must be signed in to change notification settings - Fork 138
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
SFTP user chroot shell path update & ls addition #2863 #2865
SFTP user chroot shell path update & ls addition #2863 #2865
Conversation
Correct currently ineffectual BASH path in SFTP chroot setup. Default sshd user specific config: via SFTP Share export, enforces `ForceCommand internal-sftp`, however future enhancements (or current by-hand "ForceCommand ..." removal) results in a chroot failure for SFTP enabled users accessing via SSH.
TestingThese changes are intended to fix the shell (bash) path, and unavailable SFTP
SSH into chrootFurther we now prove our chroot instantiation, along with the newly enabled ls. rockstor-core/src/rockstor/system/ssh.py Line 149 in 701b44c
and by default results in the following:
The following is the result of
|
And rpm was build using this PR's branch and using the same SFTP export setup as in the prior comment we have the resulting chroot for the given user (SFTP exported share owner):
I.e. the addition of ls and it's additional libraries. SFTP access retest (rpm install this time)
SSH access (default)
Post by-hand ForceCommand line removal (and rockstor* service stop & start), followed by delete and re-establishing the same SFTP share export: rockstor-core/src/rockstor/system/ssh.py Line 149 in 701b44c
|
Correct currently ineffectual BASH path in SFTP chroot setup. Default sshd user specific config: via SFTP Share export, enforces
ForceCommand internal-sftp
, however future enhancements (or current by-hand "ForceCommand ..." removal) results in a chroot failure for SFTP enabled users accessing via SSH.Fixes #2863
Follow-up enhancements to chroot changes last made in 5.0.11-0.