<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Command restriction - SSH in Operating System - Linux</title>
    <link>https://community.hpe.com/t5/operating-system-linux/command-restriction-ssh/m-p/3201509#M10239</link>
    <description>You could also use SSH keypairs that have single commands attached to them, or Sudo so that they would none interactive access to these accounts.&lt;BR /&gt;&lt;BR /&gt;I know this is more complicated than a complete chroot jail, but once setup it can be easier to administer.&lt;BR /&gt;&lt;BR /&gt;If the users are non-technical you could wrap your commands in a simple shell-script/menu that is executed as soon as they login.&lt;BR /&gt;</description>
    <pubDate>Thu, 26 Feb 2004 05:53:59 GMT</pubDate>
    <dc:creator>Andrew Cowan</dc:creator>
    <dc:date>2004-02-26T05:53:59Z</dc:date>
    <item>
      <title>Command restriction - SSH</title>
      <link>https://community.hpe.com/t5/operating-system-linux/command-restriction-ssh/m-p/3201506#M10236</link>
      <description>Hi!&lt;BR /&gt;&lt;BR /&gt;I would like to set up some accounts on a linux server with restrictions to the number of commands that users will be able to execute.&lt;BR /&gt;&lt;BR /&gt;I want some accounts to only access to their home or other directories only with SFTP to upload backup files, but I don't want them to use their login for other purpose on this machine. How can I achieve that?&lt;BR /&gt;&lt;BR /&gt;And if I want to restrict the user to 5 commands for example?&lt;BR /&gt;&lt;BR /&gt;Thank you</description>
      <pubDate>Wed, 25 Feb 2004 03:24:15 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/command-restriction-ssh/m-p/3201506#M10236</guid>
      <dc:creator>Marc-Aurele Brothier</dc:creator>
      <dc:date>2004-02-25T03:24:15Z</dc:date>
    </item>
    <item>
      <title>Re: Command restriction - SSH</title>
      <link>https://community.hpe.com/t5/operating-system-linux/command-restriction-ssh/m-p/3201507#M10237</link>
      <description>Simple way is to create a directory into which you copy the commands you want the user to have.  Then set the users PATH to only point into that directory.  This obviously doesn't stop them changing their PATH (can you make PATH read only?).&lt;BR /&gt; &lt;BR /&gt;You can getmore sophisticated by using things such as the restricted shell "rsh" which stops them changing directories and the like.  FInally, you can consider compining the above with "chroot" with which you can make their home directory the "root" directory for them.  There is no way of breaking out of that.</description>
      <pubDate>Wed, 25 Feb 2004 03:35:53 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/command-restriction-ssh/m-p/3201507#M10237</guid>
      <dc:creator>Mark Grant</dc:creator>
      <dc:date>2004-02-25T03:35:53Z</dc:date>
    </item>
    <item>
      <title>Re: Command restriction - SSH</title>
      <link>https://community.hpe.com/t5/operating-system-linux/command-restriction-ssh/m-p/3201508#M10238</link>
      <description>Hi,&lt;BR /&gt;&lt;BR /&gt;What I'd recommend is to set up a chrooted sftp server. The advantage of a chrooted ftp environment is that you can determine which commands can be run (as you create a separate environment you decide what files you copy). Since you only want the users to ftp to this machine it probably doesn't matter where their homedir is. For instance, you could create them in /opt/ftp/chroot/home/&lt;USERNAME&gt;.&lt;BR /&gt;&lt;BR /&gt;To restrict the user to 5 commands can be achieved by changing the amount of simultaneous logins. See your config file for this (I'm not sure sftp can achieve this, it seems pretty simple.) I recommend you use pure-ftp (&lt;A href="http://www.pureftpd.org/)," target="_blank"&gt;http://www.pureftpd.org/),&lt;/A&gt; which supports SSL/TLS and does all of the above and is widespread.&lt;BR /&gt;&lt;BR /&gt;A good start to set up sftp (from OpenSSH) can be found here:&lt;BR /&gt;&lt;A href="http://mail.incredimail.com/howto/openssh/addons/sftp-chroot.howto.txt" target="_blank"&gt;http://mail.incredimail.com/howto/openssh/addons/sftp-chroot.howto.txt&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Hope this helps,&lt;BR /&gt;&lt;BR /&gt;Robert&lt;/USERNAME&gt;</description>
      <pubDate>Wed, 25 Feb 2004 09:03:55 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/command-restriction-ssh/m-p/3201508#M10238</guid>
      <dc:creator>Robert Binkhorst</dc:creator>
      <dc:date>2004-02-25T09:03:55Z</dc:date>
    </item>
    <item>
      <title>Re: Command restriction - SSH</title>
      <link>https://community.hpe.com/t5/operating-system-linux/command-restriction-ssh/m-p/3201509#M10239</link>
      <description>You could also use SSH keypairs that have single commands attached to them, or Sudo so that they would none interactive access to these accounts.&lt;BR /&gt;&lt;BR /&gt;I know this is more complicated than a complete chroot jail, but once setup it can be easier to administer.&lt;BR /&gt;&lt;BR /&gt;If the users are non-technical you could wrap your commands in a simple shell-script/menu that is executed as soon as they login.&lt;BR /&gt;</description>
      <pubDate>Thu, 26 Feb 2004 05:53:59 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/command-restriction-ssh/m-p/3201509#M10239</guid>
      <dc:creator>Andrew Cowan</dc:creator>
      <dc:date>2004-02-26T05:53:59Z</dc:date>
    </item>
  </channel>
</rss>

