<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How do you chroot your openssh users in Operating System - Linux</title>
    <link>https://community.hpe.com/t5/operating-system-linux/how-do-you-chroot-your-openssh-users/m-p/3984556#M27928</link>
    <description>SEP,&lt;BR /&gt;&lt;BR /&gt;check this out:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://209.85.165.104/search?q=cache:N_aul1dNFpEJ:www.opensourcehowto.org/how-to/fedora/vsftpd--openssl--net2ftp.html+howto+vsftpd+ssl&amp;amp;hl=en&amp;amp;ct=clnk&amp;amp;cd=5&amp;amp;gl=us" target="_blank"&gt;http://209.85.165.104/search?q=cache:N_aul1dNFpEJ:www.opensourcehowto.org/how-to/fedora/vsftpd--openssl--net2ftp.html+howto+vsftpd+ssl&amp;amp;hl=en&amp;amp;ct=clnk&amp;amp;cd=5&amp;amp;gl=us&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Had to send a cached version as the corporate proxy has blocked the site.</description>
    <pubDate>Thu, 19 Apr 2007 10:02:20 GMT</pubDate>
    <dc:creator>Court Campbell</dc:creator>
    <dc:date>2007-04-19T10:02:20Z</dc:date>
    <item>
      <title>How do you chroot your openssh users</title>
      <link>https://community.hpe.com/t5/operating-system-linux/how-do-you-chroot-your-openssh-users/m-p/3984549#M27921</link>
      <description>I need to chroot sftp users in Linux.&lt;BR /&gt;&lt;BR /&gt;Every approach has a pitfall.&lt;BR /&gt;&lt;BR /&gt;One recompiles openssh and I want to use stock redhat.&lt;BR /&gt;&lt;BR /&gt;I've tried this:&lt;BR /&gt;&lt;A href="http://rpmfind.net//linux/RPM/dag/redhat/el4/i386/jailkit-1.3-1.2.el4.rf.i386.html" target="_blank"&gt;http://rpmfind.net//linux/RPM/dag/redhat/el4/i386/jailkit-1.3-1.2.el4.rf.i386.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;I had a working configuration and user add script but I managed to broke it and lost my script.&lt;BR /&gt;&lt;BR /&gt;So what do you do?&lt;BR /&gt;&lt;BR /&gt;Anyone using the jailkit v1.3 or v2.0 above having a valid user add script gets a bunny.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Thu, 19 Apr 2007 03:32:30 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/how-do-you-chroot-your-openssh-users/m-p/3984549#M27921</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2007-04-19T03:32:30Z</dc:date>
    </item>
    <item>
      <title>Re: How do you chroot your openssh users</title>
      <link>https://community.hpe.com/t5/operating-system-linux/how-do-you-chroot-your-openssh-users/m-p/3984550#M27922</link>
      <description>Hi SEP,&lt;BR /&gt;&lt;BR /&gt;Been there, tried that, and couldn't figure it out :-(&lt;BR /&gt;&lt;BR /&gt;I was trying to set up a Fedora box to support chrooted FTP users (vsftpd) as well as sftp, and whichever way I tried something else would fail...&lt;BR /&gt;&lt;BR /&gt;In the end I balanced up the security risk and left the sftp users not chrooted, and used the builtins of vsftpd to control chrooting of the standard ftp users. Not ideal though.&lt;BR /&gt;&lt;BR /&gt;I'm sure it must be possible somehow ...&lt;BR /&gt;&lt;BR /&gt;Regards,&lt;BR /&gt;&lt;BR /&gt;Rob</description>
      <pubDate>Thu, 19 Apr 2007 04:18:48 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/how-do-you-chroot-your-openssh-users/m-p/3984550#M27922</guid>
      <dc:creator>Rob Leadbeater</dc:creator>
      <dc:date>2007-04-19T04:18:48Z</dc:date>
    </item>
    <item>
      <title>Re: How do you chroot your openssh users</title>
      <link>https://community.hpe.com/t5/operating-system-linux/how-do-you-chroot-your-openssh-users/m-p/3984551#M27923</link>
      <description>I tried also and I think that chrooting user environment for scp it's too complex to manage (in your case, you lost your script and you have problems).&lt;BR /&gt;&lt;BR /&gt;I really prefer to use vsftpd with SSL encription, provided by vsftpd itself. Configure chroot users in vsftpd is  very easy, just like ftpusers (I think you already know this).</description>
      <pubDate>Thu, 19 Apr 2007 04:22:40 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/how-do-you-chroot-your-openssh-users/m-p/3984551#M27923</guid>
      <dc:creator>Ivan Ferreira</dc:creator>
      <dc:date>2007-04-19T04:22:40Z</dc:date>
    </item>
    <item>
      <title>Re: How do you chroot your openssh users</title>
      <link>https://community.hpe.com/t5/operating-system-linux/how-do-you-chroot-your-openssh-users/m-p/3984552#M27924</link>
      <description>Correct Ivan.&lt;BR /&gt;&lt;BR /&gt;A procedure for SSL and vsftp has point value here. Is the authentication in such a scheme also encrypted?&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Thu, 19 Apr 2007 04:58:52 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/how-do-you-chroot-your-openssh-users/m-p/3984552#M27924</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2007-04-19T04:58:52Z</dc:date>
    </item>
    <item>
      <title>Re: How do you chroot your openssh users</title>
      <link>https://community.hpe.com/t5/operating-system-linux/how-do-you-chroot-your-openssh-users/m-p/3984553#M27925</link>
      <description>Shalom,&lt;BR /&gt;&lt;BR /&gt;I had this working perfectly on my desktop linux box at work.&lt;BR /&gt;&lt;BR /&gt;Then I walloped it with Centos 5 and forgot to back up my script. Now I'm unsure which is more stable 1.3 or 2.0 or which I used.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://rpmfind.net//linux/RPM/dag/redhat/el4/i386/jailkit-2.0-1.el4.rf.i386.html" target="_blank"&gt;http://rpmfind.net//linux/RPM/dag/redhat/el4/i386/jailkit-2.0-1.el4.rf.i386.html&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Thu, 19 Apr 2007 05:00:29 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/how-do-you-chroot-your-openssh-users/m-p/3984553#M27925</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2007-04-19T05:00:29Z</dc:date>
    </item>
    <item>
      <title>Re: How do you chroot your openssh users</title>
      <link>https://community.hpe.com/t5/operating-system-linux/how-do-you-chroot-your-openssh-users/m-p/3984554#M27926</link>
      <description>&amp;gt;&amp;gt; A procedure for SSL and vsftp has point value here. Is the authentication in such a scheme also encrypted?&lt;BR /&gt;&lt;BR /&gt;Yes. It works like https. I can't find a quick guide about how to set up it, I have it in spanish, but FAIK you won't have problems finding the information.</description>
      <pubDate>Thu, 19 Apr 2007 06:31:34 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/how-do-you-chroot-your-openssh-users/m-p/3984554#M27926</guid>
      <dc:creator>Ivan Ferreira</dc:creator>
      <dc:date>2007-04-19T06:31:34Z</dc:date>
    </item>
    <item>
      <title>Re: How do you chroot your openssh users</title>
      <link>https://community.hpe.com/t5/operating-system-linux/how-do-you-chroot-your-openssh-users/m-p/3984555#M27927</link>
      <description>Fair enough.&lt;BR /&gt;&lt;BR /&gt;I'll run some tests.&lt;BR /&gt;&lt;BR /&gt;Hebrew is hard enough. I can live without a procedure in Spanish.&lt;BR /&gt;&lt;BR /&gt;Pienso que lo leerÃ­a algo en inglÃ©s &lt;BR /&gt;&lt;BR /&gt;Ani Choshev ani ohaiv l'kro b'anglist&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Thu, 19 Apr 2007 07:27:25 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/how-do-you-chroot-your-openssh-users/m-p/3984555#M27927</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2007-04-19T07:27:25Z</dc:date>
    </item>
    <item>
      <title>Re: How do you chroot your openssh users</title>
      <link>https://community.hpe.com/t5/operating-system-linux/how-do-you-chroot-your-openssh-users/m-p/3984556#M27928</link>
      <description>SEP,&lt;BR /&gt;&lt;BR /&gt;check this out:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://209.85.165.104/search?q=cache:N_aul1dNFpEJ:www.opensourcehowto.org/how-to/fedora/vsftpd--openssl--net2ftp.html+howto+vsftpd+ssl&amp;amp;hl=en&amp;amp;ct=clnk&amp;amp;cd=5&amp;amp;gl=us" target="_blank"&gt;http://209.85.165.104/search?q=cache:N_aul1dNFpEJ:www.opensourcehowto.org/how-to/fedora/vsftpd--openssl--net2ftp.html+howto+vsftpd+ssl&amp;amp;hl=en&amp;amp;ct=clnk&amp;amp;cd=5&amp;amp;gl=us&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;Had to send a cached version as the corporate proxy has blocked the site.</description>
      <pubDate>Thu, 19 Apr 2007 10:02:20 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/how-do-you-chroot-your-openssh-users/m-p/3984556#M27928</guid>
      <dc:creator>Court Campbell</dc:creator>
      <dc:date>2007-04-19T10:02:20Z</dc:date>
    </item>
    <item>
      <title>Re: How do you chroot your openssh users</title>
      <link>https://community.hpe.com/t5/operating-system-linux/how-do-you-chroot-your-openssh-users/m-p/3984557#M27929</link>
      <description>Also this may help. I haven't read all the code, but it looks promising.&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www.fuschlberger.net/programs/ssh-scp-sftp-chroot-jail/make_chroot_jail.sh.html" target="_blank"&gt;http://www.fuschlberger.net/programs/ssh-scp-sftp-chroot-jail/make_chroot_jail.sh.html&lt;/A&gt;</description>
      <pubDate>Thu, 19 Apr 2007 10:05:37 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/how-do-you-chroot-your-openssh-users/m-p/3984557#M27929</guid>
      <dc:creator>Court Campbell</dc:creator>
      <dc:date>2007-04-19T10:05:37Z</dc:date>
    </item>
    <item>
      <title>Re: How do you chroot your openssh users</title>
      <link>https://community.hpe.com/t5/operating-system-linux/how-do-you-chroot-your-openssh-users/m-p/3984558#M27930</link>
      <description>Not exactly what you're asking for, but have you looked in to using scponly or rssh instead of jailkit to help support your chroot environment? They're one trick ponies, you can't use them to chroot anything else but you can safely assume that their documentation will apply to sftp.</description>
      <pubDate>Thu, 19 Apr 2007 10:12:50 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/how-do-you-chroot-your-openssh-users/m-p/3984558#M27930</guid>
      <dc:creator>Heironimus</dc:creator>
      <dc:date>2007-04-19T10:12:50Z</dc:date>
    </item>
    <item>
      <title>Re: How do you chroot your openssh users</title>
      <link>https://community.hpe.com/t5/operating-system-linux/how-do-you-chroot-your-openssh-users/m-p/3984559#M27931</link>
      <description>When Steven just posted his question I decided to try that later on. Meanwhile I have: I got jailkit 2.3 from the web and tried the sftp thing. It seemed to work pretty fast on both an Oracle Enterprise Linux and a Debian.&lt;BR /&gt;&lt;BR /&gt;However, reading the updates to this thread (and the names next to them) I'm starting to wonder whether I'm trying to do the same thing.&lt;BR /&gt;&lt;BR /&gt;Therefore, I will hide the possible sillyness in an attachment. I've written what I just did in a little text file.&lt;BR /&gt;&lt;BR /&gt;Should it be what you need, excellent. Otherwise, forgive me ;-)&lt;BR /&gt;&lt;BR /&gt;Cheers,&lt;BR /&gt;Wout&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 19 Apr 2007 10:45:15 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/how-do-you-chroot-your-openssh-users/m-p/3984559#M27931</guid>
      <dc:creator>Wouter Jagers</dc:creator>
      <dc:date>2007-04-19T10:45:15Z</dc:date>
    </item>
    <item>
      <title>Re: How do you chroot your openssh users</title>
      <link>https://community.hpe.com/t5/operating-system-linux/how-do-you-chroot-your-openssh-users/m-p/3984560#M27932</link>
      <description>Shalom,&lt;BR /&gt;&lt;BR /&gt;I thank you for you input.&lt;BR /&gt;&lt;BR /&gt;I believe that going with the latest tar based version is a possibility for us.&lt;BR /&gt;&lt;BR /&gt;I will report results.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Sun, 22 Apr 2007 04:31:47 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/how-do-you-chroot-your-openssh-users/m-p/3984560#M27932</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2007-04-22T04:31:47Z</dc:date>
    </item>
    <item>
      <title>Re: How do you chroot your openssh users</title>
      <link>https://community.hpe.com/t5/operating-system-linux/how-do-you-chroot-your-openssh-users/m-p/3984561#M27933</link>
      <description>Shalom again,&lt;BR /&gt;&lt;BR /&gt;curios results.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;sftp yaira@localhost&lt;BR /&gt;&lt;BR /&gt;/var/log/messages&lt;BR /&gt;&lt;BR /&gt;Apr 23 13:12:40 gate sshd(pam_unix)[28957]: session opened for user yaira by (uid=0)&lt;BR /&gt;Apr 23 13:12:40 gate jk_chrootsh[28958]: now entering jail /home/ftpusers/yaira for user yaira (14618)&lt;BR /&gt;Apr 23 13:12:40 gate sshd(pam_unix)[28957]: session closed for user yaira&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Mon, 23 Apr 2007 05:14:24 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/how-do-you-chroot-your-openssh-users/m-p/3984561#M27933</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2007-04-23T05:14:24Z</dc:date>
    </item>
    <item>
      <title>Re: How do you chroot your openssh users</title>
      <link>https://community.hpe.com/t5/operating-system-linux/how-do-you-chroot-your-openssh-users/m-p/3984562#M27934</link>
      <description>I saw the same thing last week.. trying to remember. &lt;BR /&gt;&lt;BR /&gt;*grind grind*&lt;BR /&gt;&lt;BR /&gt;Ooh, two things:&lt;BR /&gt;&lt;BR /&gt;- try and create a /tmp directory within your jail.&lt;BR /&gt;- double check whether the right path to the sftpd executable is in the configuration.&lt;BR /&gt;&lt;BR /&gt;G'luck :-)&lt;BR /&gt;&lt;BR /&gt;Cheers,&lt;BR /&gt;Wout</description>
      <pubDate>Mon, 23 Apr 2007 05:17:48 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/how-do-you-chroot-your-openssh-users/m-p/3984562#M27934</guid>
      <dc:creator>Wouter Jagers</dc:creator>
      <dc:date>2007-04-23T05:17:48Z</dc:date>
    </item>
    <item>
      <title>Re: How do you chroot your openssh users</title>
      <link>https://community.hpe.com/t5/operating-system-linux/how-do-you-chroot-your-openssh-users/m-p/3984563#M27935</link>
      <description>Just started from scratch, encountered (almost) similar issue.&lt;BR /&gt;&lt;BR /&gt;Why ? It's on my OEL: &lt;BR /&gt;Before issuing the jk_init statements I needed to edit /etc/jailkit/jk_init.ini (to change the sftp-server path to /usr/libexec/openssh/sftp-server)&lt;BR /&gt;&lt;BR /&gt;Later, when editing /home/sftproot/etc/jailkit/jk_lsh.ini I forgot to adapt the 'executable' part:&lt;BR /&gt;&lt;BR /&gt;[group sftpu]&lt;BR /&gt;paths=/usr/lib/&lt;BR /&gt;executables= /usr/lib/sftp-server&lt;BR /&gt;allow_word_expansion = 0&lt;BR /&gt;umask = 002&lt;BR /&gt;&lt;BR /&gt;This logged me out instantly as well. However there's a message in the syslog. (WARNING: user ftp1 (501) tried to run '/usr/libexec/openssh/sftp-server', which is not allowed according to /etc/jailkit/jk_lsh.ini)&lt;BR /&gt;&lt;BR /&gt;After changing:&lt;BR /&gt;executables= /usr/lib/sftp-server&lt;BR /&gt;to:&lt;BR /&gt;executables= /usr/libexec/openssh/sftp-server&lt;BR /&gt;&lt;BR /&gt;..it works again.&lt;BR /&gt;</description>
      <pubDate>Mon, 23 Apr 2007 06:32:10 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/how-do-you-chroot-your-openssh-users/m-p/3984563#M27935</guid>
      <dc:creator>Wouter Jagers</dc:creator>
      <dc:date>2007-04-23T06:32:10Z</dc:date>
    </item>
    <item>
      <title>Re: How do you chroot your openssh users</title>
      <link>https://community.hpe.com/t5/operating-system-linux/how-do-you-chroot-your-openssh-users/m-p/3984564#M27936</link>
      <description>&lt;!--!*#--&gt;Shalom  Wouter,&lt;BR /&gt;&lt;BR /&gt;Your approach solved the problem.&lt;BR /&gt;&lt;BR /&gt;Due to the fact I used an rpm based jailkit and our server environment, I made some changes.&lt;BR /&gt;&lt;BR /&gt;You will notice that this code is mostly yours.&lt;BR /&gt;&lt;BR /&gt;This is not final, I will post a final version after unit testing.&lt;BR /&gt;&lt;BR /&gt;The core problem was in my script, instead of dealing with the individual permissions problems I encounted at login, I openned up permissions too widely breaking the jail.&lt;BR /&gt;&lt;BR /&gt;I have to run and help my wife shop and stuff, and will then assign points. Obviously Wouter is going to get a pair of bunnies. Approaches I decided not to test will be rated subjectively.&lt;BR /&gt;&lt;BR /&gt;#!/bin/bash&lt;BR /&gt;&lt;BR /&gt;set -x&lt;BR /&gt;USERNAME=$1&lt;BR /&gt;&lt;BR /&gt;useradd -m -g client ${USERNAME}&lt;BR /&gt;&lt;BR /&gt;passwd ${username}&lt;BR /&gt;&lt;BR /&gt;mkdir -p /home/ftpusers/${USERNAME}&lt;BR /&gt;/usr/sbin/jk_init -v /home/ftpusers/${USERNAME} sftp scp&lt;BR /&gt;/usr/sbin/jk_init -v /home/ftpusers/${USERNAME} jk_lsh&lt;BR /&gt;/usr/sbin/jk_jailuser -m -n -j /home/ftpusers/${USERNAME} ${USERNAME}&lt;BR /&gt;&lt;BR /&gt;cd /home/ftpusers/${USERNAME}&lt;BR /&gt;/bin/chown -R {USERNAME}:client home/&lt;BR /&gt;/bin/chown -R ${USERNAME}:client usr/&lt;BR /&gt;/bin.chown -R ${USERNAME}:client lib/&lt;BR /&gt;# chown ${USERNAME}:client /home/ftpusers/yaira//usr/sbin/jk_lsh&lt;BR /&gt;chmod a+rx ${USERNAME}/&lt;BR /&gt;chmod a+rx etc/&lt;BR /&gt;chmod a+rx etc/passwd&lt;BR /&gt;chmod a+rx etc/group&lt;BR /&gt;chmod u+rx /home/ftpusers/yaira//home/&lt;BR /&gt;chmod u+rx /home/ftpusers/yaira//home/yaira/&lt;BR /&gt;&lt;BR /&gt;cd etc/jailkit&lt;BR /&gt;sed s/sftp/${USERNAME}/g jk_lsh.ini &amp;gt; jk_lsh.ini.bck;&lt;BR /&gt;mv jk_lsh.ini.bck jk_lsh.ini&lt;BR /&gt;&lt;BR /&gt;killall jk_socketd&lt;BR /&gt;&lt;BR /&gt;jk_socketd&lt;BR /&gt;&lt;BR /&gt;exit 0&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Shmuel</description>
      <pubDate>Mon, 23 Apr 2007 06:37:32 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/how-do-you-chroot-your-openssh-users/m-p/3984564#M27936</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2007-04-23T06:37:32Z</dc:date>
    </item>
    <item>
      <title>Re: How do you chroot your openssh users</title>
      <link>https://community.hpe.com/t5/operating-system-linux/how-do-you-chroot-your-openssh-users/m-p/3984565#M27937</link>
      <description>Truly (truly!) honoured to have been of help.&lt;BR /&gt;&lt;BR /&gt;A bunny from a two-star olympian can make one's day ;-)&lt;BR /&gt;&lt;BR /&gt;Cheers,&lt;BR /&gt;Wout</description>
      <pubDate>Mon, 23 Apr 2007 10:02:36 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/how-do-you-chroot-your-openssh-users/m-p/3984565#M27937</guid>
      <dc:creator>Wouter Jagers</dc:creator>
      <dc:date>2007-04-23T10:02:36Z</dc:date>
    </item>
    <item>
      <title>Re: How do you chroot your openssh users</title>
      <link>https://community.hpe.com/t5/operating-system-linux/how-do-you-chroot-your-openssh-users/m-p/3984566#M27938</link>
      <description>Off topic.&lt;BR /&gt;&lt;BR /&gt;Here is a good one, case of Linux discrimination.&lt;BR /&gt;&lt;BR /&gt;Bezeq, the local equivalent of AT&amp;amp;T before the breakup has a pretty fast Internet service, ADSL.&lt;BR /&gt;&lt;BR /&gt;They hand out modems that also double as routers. B-FOCuS 312+.&lt;BR /&gt;&lt;BR /&gt;Pretty decent router. My VOIP phone (btw my old phone phone still works if you wanna chat) loves it no problems. Its got a proprietary OS, perhaps a Linux distribution but it figuers out things just fine.&lt;BR /&gt;&lt;BR /&gt;Aside: work pays for the connection because its critical I can get in and do work even if my street which has a 25 degree uphill grade is iced over.&lt;BR /&gt;&lt;BR /&gt;My windows box figures things out with no issues.&lt;BR /&gt;&lt;BR /&gt;Linux. No dice. A few websites work on browser, most just stare at me. I ignore the problem. We have a second connection I got on a long term contract for $19 a month that works fine with Linux.&lt;BR /&gt;&lt;BR /&gt;Kid's discover Internet games, start chewing up their connection. Someone wants to watch Battlestar Galactica and we don't have a TV (bittorrent? I didn't post that did I).&lt;BR /&gt;&lt;BR /&gt;With my little lab here the collision domain in my office is terrible and I can't avoid the problem any more. I must figure out why my Linux boxes won't work with bezeq. I thought the router was broken. Nah.&lt;BR /&gt;&lt;BR /&gt;Turns out the router has a little DHCP server. Hands out addresses 10.0.0.1-something with a HUGE collision domain netmask 255.0.0.0. /etc/resolv.conf says nameserver 10.0.0.138&lt;BR /&gt;&lt;BR /&gt;Now this thing hands out addresses no problem at all. dig and nslookup return answers instantly.&lt;BR /&gt;&lt;BR /&gt;Something about the web browser doesn't like it.&lt;BR /&gt;&lt;BR /&gt;I turn off iptables.&lt;BR /&gt;&lt;BR /&gt;I turn of ip6tables (what is that for?)&lt;BR /&gt;&lt;BR /&gt;I turn off and uninstall firestarter(great tool).&lt;BR /&gt;&lt;BR /&gt;Doesn't help.&lt;BR /&gt;&lt;BR /&gt;A few hours ago I decided (FC btw) to try and turn off SELINUX. I didn't do it right (say RHCE three times) and the box kernel panics. Can't even boot single user mode, had to boot rescue mode. Where was the DVD? Actually it was ith all the other important ones in a protective case. Whew.&lt;BR /&gt;&lt;BR /&gt;Customer service, router must be broken? My Hebrew may NEVER be good enough for that.&lt;BR /&gt;&lt;BR /&gt;Finally in desparation I turn to go to Dr. Google.&lt;BR /&gt;&lt;BR /&gt;Input search.&lt;BR /&gt;&lt;BR /&gt;bezeq DNS servers (a tough search because bezeq is a transliteration of a three letter word)&lt;BR /&gt;&lt;BR /&gt;First link says change the MTU=1492 in ifcfg file. No help.&lt;BR /&gt;&lt;BR /&gt;Next link lists Bezeq's NAME servers.&lt;BR /&gt;&lt;BR /&gt;That works. I can browse on my Linux box and am currently in a browsing frenzy.&lt;BR /&gt;&lt;BR /&gt;The why is meaningful if we ever figure it out.&lt;BR /&gt;&lt;BR /&gt;Seems Windows can take the DHCP handoff which is designed specifically for it. Linux can't. not Centos, not RH, not Fedora Core 6.&lt;BR /&gt;&lt;BR /&gt;Tried all kinds of browser proxy configuration but Bezeq dosn't have a proxy server.&lt;BR /&gt;&lt;BR /&gt;Whew.&lt;BR /&gt;&lt;BR /&gt;For my next trick, finding a program that lets my systems SMS my phone in Israel when they are unhappy. rpm based?&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Mon, 23 Apr 2007 17:07:47 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/how-do-you-chroot-your-openssh-users/m-p/3984566#M27938</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2007-04-23T17:07:47Z</dc:date>
    </item>
    <item>
      <title>Re: How do you chroot your openssh users</title>
      <link>https://community.hpe.com/t5/operating-system-linux/how-do-you-chroot-your-openssh-users/m-p/3984567#M27939</link>
      <description>&amp;gt; For my next trick, finding a program that&lt;BR /&gt;&amp;gt; lets my systems SMS my phone in Israel when&lt;BR /&gt;&amp;gt; they are unhappy. rpm based?&lt;BR /&gt;&lt;BR /&gt;May not be what you're looking for but you could look at Hylafax. As well as its faxing capabilities it also provides a SNPP server which can be configured to send SMS messages.&lt;BR /&gt;&lt;BR /&gt;Downside is that it needs to be configured with a modem to dial out to a SMS gateway. I'm guessing you're probably looking for a 'net based version...&lt;BR /&gt;&lt;BR /&gt;CHeers,&lt;BR /&gt;&lt;BR /&gt;Rob</description>
      <pubDate>Tue, 24 Apr 2007 04:28:04 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/how-do-you-chroot-your-openssh-users/m-p/3984567#M27939</guid>
      <dc:creator>Rob Leadbeater</dc:creator>
      <dc:date>2007-04-24T04:28:04Z</dc:date>
    </item>
    <item>
      <title>Re: How do you chroot your openssh users</title>
      <link>https://community.hpe.com/t5/operating-system-linux/how-do-you-chroot-your-openssh-users/m-p/3984568#M27940</link>
      <description>Weird.  I've never had a problem with pump/dhclient doing '/etc/resolv.conf' updates before (unless they are explicitly told not to by the 'PEERDNS' option in the interface configuration (from ifup):&lt;BR /&gt;&lt;BR /&gt;    if [ "${PEERDNS}" = "no" ]; then&lt;BR /&gt;       # Do not update/replace resolv.conf.&lt;BR /&gt;       PUMPARGS="${PUMPARGS} -d"&lt;BR /&gt;       DHCPCDARGS="${DHCPCDARGS} -R"&lt;BR /&gt;    fi&lt;BR /&gt;)&lt;BR /&gt;&lt;BR /&gt;If you had SELINUX turned on, it may have been preventing the daemon from modifying '/etc/resolv.conf' dynamically.&lt;BR /&gt;&lt;BR /&gt;As for software to SMS you, from experience, it's easier to just use a 3rd party email-to-SMS gateway.  It's not the software that's the issue, it's the getting the teleco service.&lt;BR /&gt;&lt;BR /&gt;Just a brief note on the how-to: &lt;A href="http://www.developershome.com/sms/howToSendSMSFromPC.asp" target="_blank"&gt;http://www.developershome.com/sms/howToSendSMSFromPC.asp&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 25 Apr 2007 22:34:04 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/how-do-you-chroot-your-openssh-users/m-p/3984568#M27940</guid>
      <dc:creator>Stuart Browne</dc:creator>
      <dc:date>2007-04-25T22:34:04Z</dc:date>
    </item>
  </channel>
</rss>

