[scponly] scponly with internal-sftp

Christopher Barry christopher.barry at qlogic.com
Fri Jun 19 11:34:20 EDT 2009


> -----Original Message-----
> From: scponly-bounces at lists.ccs.neu.edu [mailto:scponly-
> bounces at lists.ccs.neu.edu] On Behalf Of Whit Blauvelt
> Sent: Wednesday, June 17, 2009 9:32 AM
> To: Kaleb Pederson
> Cc: scponly at lists.ccs.neu.edu
> Subject: Re: [scponly] scponly with internal-sftp
> 
> On Tue, Jun 16, 2009 at 08:43:32PM -0700, Kaleb Pederson wrote:
> 
> > > As for steps, instead of adding the user to the group, it's
> creating the
> > > etc/passwd within their directory, so that's about an even amount
> of
> > > work.
> >
> > I'm not sure I understand.  Are you placing it within the users home
> > directory or within the chroot?
> 
> Yeah, scponlyc when used with OpenSSH's internal-sftp to do a chroot
> requires _only_ the existence of etc/passwd within the chroot directory
> assigned the user - none of the other directories or files.
> 
> > > Whether this is more or less secure than the pure OpenSSH way of
> doing an
> > > sftp chroot I just plain don't know. Is it like a belt and
> suspenders - more
> > > protection - or is it just having two potential sets of
> vulnerabilities?
> >
> > If you can get away with just SSH, then I consider it an extra chance
> > for vulnerabilities and breakage.  I always recommend to get away
> with
> > the least amount of permissions and layers possible.
> 
> You're probably right. Between "more layers of protection" and "more
> potential layers of vulnerability" the second could well be the
> stronger
> concern here.
> 
> One other small advantage of the combination though: If a normal ssh
> connection is attempted, the combined approach drops it properly. The
> OpenSSH-only approach currently hangs after the password. Promptly
> dropping
> it seems the more secure action.
> 
> Whit

Are you saying that in the combined configuration, normal ssh into the box is unavailable?

Regards,
-C




More information about the scponly mailing list