Stories
Slash Boxes
Comments

SoylentNews is people

posted by Fnord666 on Wednesday January 10 2018, @03:01PM   Printer-friendly
from the practicing-safe-sftp dept.

The SFTP component in OpenSSH provides a chroot-feature for hardening. It is stated in the documentation that the chroot directory must not be writable by the user account, though specific files and subdirectories within it are allowed. Some people were questioning the read-only restriction. halfdog documents some analysis which is the result of discussions on openssh-dev mailing list. Here are some arguments about why these restrictions still makes sense in 2018.


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 2) by pkrasimirov on Wednesday January 10 2018, @03:42PM (1 child)

    by pkrasimirov (3358) Subscriber Badge on Wednesday January 10 2018, @03:42PM (#620492)

    Yes, as long as there are valid arguments.

    Starting Score:    1  point
    Karma-Bonus Modifier   +1  

    Total Score:   2  
  • (Score: 4, Insightful) by JoeMerchant on Wednesday January 10 2018, @03:54PM

    by JoeMerchant (3937) on Wednesday January 10 2018, @03:54PM (#620494)

    I'd rather catch a good story off of mailing list once in awhile instead of endless parroting of the Reuters feed.

    --
    🌻🌻 [google.com]