Suggestion for openssh
John Olsson M
john.m.olsson at ericsson.com
Wed Feb 8 18:21:05 EST 2012
Ben Lindstrom wrote:
> It would be more useful to allow "Subsystem" be allowed in a
> 'Match' section and ensure 'Subsystem sftp none' or such to
> remove it from the user's valid subsystem support.
I'm strongly in favor of such an enhancement of OpenSSH. This would also allow for setting a chroot jail per individual subsystem. E.g. sftp chroot:ed but not ssh. :)
See also https://bugzilla.mindrot.org/show_bug.cgi?id=1975
/John
-----Original Message-----
From: openssh-unix-dev-bounces+john.m.olsson=ericsson.com at mindrot.org [mailto:openssh-unix-dev-bounces+john.m.olsson=ericsson.com at mindrot.org] On Behalf Of Ben Lindstrom
Sent: den 7 februari 2012 21:44
To: paulo.henrique at cptec.inpe.br
Cc: openssh-unix-dev at mindrot.org
Subject: Re: Suggestion for openssh
On Feb 7, 2012, at 6:04 AM, Paulo wrote:
> Hi!
>
> I do not know if it's the ideal place, but I'm sending some suggestion.
> Always use openssh and its enormous features.
>
> - I needed to create an environment with only sftp access and thus used:
>
> - Match User suporte
> ForceCommand / usr / lib / openssh / sftp-server
>
> OK! It worked perfectly! But only sftp.
>
> - Create an environment with only blocking the ssh, but scp and sftp
> access, I used:
> - Rssh;
> - Mysecureshell;
> - Scponly.
> Work, but change my SHELL, and also created another
> environment for authentication and this is not good.
>
>
> So I suggest to you developers the following idea:
> - Create the following options to sshd_config:
> - DenyCmdssh
> - DenyCmdscp
This is kinda bogus.. "scp" is just a normal program. All the scp command does is the moral equiv of:
tar -cvf .. | ssh .. tar -xvf
So that deny command isn't possible unless you are looking to block the whole ability to run remote commands. Which has been discussed and the decision was long ago to let it be a shell level issue. As there is no really good way of handling this. Even if the user has a normal shell they can still bluff this behavior via expect scripts.
> - DenyCmdsftp
This is also bogus because if you deny "sftp" but allow "scp" one can still
do: sftp -1 ... which will act like how scp works by ignoring the subsystem
definitions.
Still, not useful to deny subsystems if you still give them access to run remote commands.
> All three options above with default value "no".
> If I want to scp access only could perform the following configuration.
>
> - Match User suporte
> DenyCmdssh yes
> DenyCmdsftp yes
> DenyCmdscp no
I see above as why this wouldn't block "scp" and why you really need to do it via the shell level.
You can look through the history of this mailinglist. This isn't the first time this has come up, and I doubt it will be the last, but in truth this isn't a problem that can be neatly solved in sshd and there are times it is just better to manage it via 3rd party tools.
- Ben
_______________________________________________
openssh-unix-dev mailing list
openssh-unix-dev at mindrot.org
https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev
More information about the openssh-unix-dev
mailing list