using OpenSSH/SFTP to replace an FTP server securely
    Damien Miller 
    djm at mindrot.org
       
    Tue May 20 17:32:37 EST 2014
    
    
  
On Mon, 19 May 2014, ?ngel Gonz?lez wrote:
> If you want something different, like chrooting them at /chrooted-users/foo,
> you
> can use -d parameter in the ForceCommand, ie.
>  ForceCommand internal-sftp -d /%u
If you're willing to live with a single chroot directory and file
permissions to keep users from each others' files then this is a great
solution. It only requires a single /chrooted-users/dev/log listener
too.
-d
    
    
More information about the openssh-unix-dev
mailing list