Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Feature/sftp #111

Merged
merged 7 commits into from
Feb 16, 2016
Merged

Feature/sftp #111

merged 7 commits into from
Feb 16, 2016

Conversation

jmara
Copy link
Contributor

@jmara jmara commented Feb 6, 2016

Hi,

referring to #110 I've created the ability to enable SFTP.

Cheers,
Jan

@atomic111
Copy link
Member

Hi jmara,
great work!!! Can you add some documentation lines to the README.md and please add somthing like

"This is a ChrootDirectory ownership problem. sshd will reject SFTP connections to accounts that are set to chroot into any directory that has ownership/permissions that sshd considers insecure. sshd's strict ownership/permissions requirements dictate that every directory in the chroot path must be owned by root and only writable by the owner. So, for example, if the chroot environment is /home must be owned by root. " see https://wiki.archlinux.org/index.php/SFTP_chroot

If you just enable it and create the group with a user then it is not working, because of the wrong ownership. Just to provide the user a hint.

Thanks

@jmara
Copy link
Contributor Author

jmara commented Feb 16, 2016

Hey Patrick,

you're welcome. I've added a Section for SFTP, added your suggestion to the FAQ and described the attributes.

Cheers,
Jan

@atomic111
Copy link
Member

Hi,
awesome work!!! Thanks

atomic111 pushed a commit that referenced this pull request Feb 16, 2016
@atomic111 atomic111 merged commit 1986bc0 into dev-sec:master Feb 16, 2016
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants