OpenSSH chrooted SFTP using public keys in Red Hat Enterprise Linux

Last modified: Sep. 11, 2009

Contents
1 - Summary
2 - Service configuration
5 - Create new group and user
6 - Service check


1 - Summary

This guide will show how to configure OpenSSH with chrooted SFTP using public
key authentication in Red Hat Enterprise Linux. This setup is only going to
allow for sftp logins and not ssh access to the shell using public key or
password authentication. This has been tested using OpenSSH 5.0 portable in
Red Hat Enterprise Linux 4.


2 - Service configuration

Configure the SSH service. SSH is located in /usr/local/etc on this server
since it was compiled from source.
# su - root
# cd /usr/local/etc
# cp sshd_config sshd_config.original

Make sure the following lines are in the configuration file. This will allow
public key and password authentication. It will also be chrooted for SFTP
connections for the users in the group named external. The users in the group
named external will only have access to their directory which is located in
the /ftp directory.

  AllowGroups external
  AuthorizedKeysFile      .ssh/authorized_keys
  PasswordAuthentication yes
  PubkeyAuthentication yes
  Subsystem       sftp    internal-sftp
  Match Group external
      ForceCommand internal-sftp
      ChrootDirectory /ftp/%u

# vi sshd_config
# service sshd restart
Stopping sshd:[  OK  ]
Starting sshd:[  OK  ]


3 - Create new group and user

Create the new group and user along with the directory permissions. These
commands will be run as the root user. The password expiration will be disabled
since the users don't have ssh access to the shell. The user will login and
their home diretory will show up as /. Also, with this setup the user has read
access to their home directory and full access to the Uploads directory.
# groupadd external
# cd /
# mkdir /ftp
# chown -R root:root /ftp
# chmod -R 755 /ftp
# useradd -c 'Test User' -G external -M -s /sbin/nologin user
# chage -m 0 -M 99999 -I -1 -E -1 -W 7 user
# passwd user
Changing password for user user.
New UNIX password: 
Retype new UNIX password: 
passwd: all authentication tokens updated successfully.
# usermod -d / user
# mkdir /ftp/user
# mkdir /ftp/user/.ssh
# mkdir /ftp/user/Uploads
# chown -R user:user /ftp/user/.ssh
# chown -R user:user /ftp/user/Uploads
# chmod -R 777 /ftp/user/Uploads


4 - Create public key on workstation

Create a public key on the client workstation. We will create an RSA key and
not give the key a passphrase in this example.
# cd ~
# ssh-keygen -q -b 4096 -t rsa
Enter file in which to save the key (/home/user/.ssh/id_rsa): 
Enter passphrase (empty for no passphrase): 
Enter same passphrase again: 
Next, get the public key (/home/user/.ssh/id_rsa.pub) to the server.


5 - Configure server to use public key

Stay as the root user and copy the public key to the following locations and
set the permissions.
# mkdir /.ssh
# cat id_rsa.pub >> /.ssh/authorized_keys
# chmod 644 /.ssh/authorized_keys
# cat id_rsa.pub > /ftp/user/.ssh/authorized_keys
# chown -R user:user /ftp/user/.ssh/authorized_keys
# chmod 400 /ftp/user/.ssh/authorized_keys


6 - Sample session

From the client workstation test out sftp using the account that was just
created on the server.
# sftp user@server.test.com
Connecting to server.test.com...
* * * * * * * * * * * * * W A R N I N G * * * * * * * * * * * * *

THIS SYSTEM IS RESTRICTED TO AUTHORIZED USERS FOR AUTHORIZED USE
  ONLY. UNAUTHORIZED ACCESS IS STRICTLY PROHIBITED AND MAY BE
 PUNISHABLE UNDER APPLICABLE LAWS. IF NOT AUTHORIZED TO ACCESS
 THIS SYSTEM, DISCONNECT NOW. BY CONTINUING, YOU CONSENT TO YOUR
  KEYSTROKES AND DATA CONTENT BEING MONITORED. ALL PERSONS ARE
 HEREBY NOTIFIED THAT THE USE OF THIS SYSTEM CONSTITUTES CONSENT
                  TO MONITORING AND AUDITING.

* * * * * * * * * * * * * W A R N I N G * * * * * * * * * * * * *
sftp> ls -la
drwxr-xr-x    4 0        0            4096 Sep 11 15:42 .
drwxr-xr-x    4 0        0            4096 Sep 11 15:42 ..
drwxr-xr-x    2 520      522          4096 Sep 11 16:07 .ssh
drwxrwxrwx    2 520      522          4096 Sep 11 15:42 Uploads
sftp> pwd
Remote working directory: /
sftp> cd ..
sftp> pwd
Remote working directory: /
sftp> ls -la .ssh
drwxr-xr-x    2 520      522          4096 Sep 11 16:07 .
drwxr-xr-x    4 0        0            4096 Sep 11 15:42 ..
-r--------    1 520      522           753 Sep 11 16:07 authorized_keys
sftp> bye
 
转自:http://www.packetwatch.net/documents/guides/2009091101.php
 


  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
大学生参加学科竞赛有着诸多好处,不仅有助于个人综合素质的提升,还能为未来职业发展奠定良好基础。以下是一些分析: 首先,学科竞赛是提高专业知识和技能水平的有效途径。通过参与竞赛,学生不仅能够深入学习相关专业知识,还能够接触到最新的科研成果和技术发展趋势。这有助于拓展学生的学科视野,使其对专业领域有更深刻的理解。在竞赛过程中,学生通常需要解决实际问题,这锻炼了他们独立思考和解决问题的能力。 其次,学科竞赛培养了学生的团队合作精神。许多竞赛项目需要团队协作来完成,这促使学生学会有效地与他人合作、协调分工。在团队合作中,学生们能够学到如何有效沟通、共同制定目标和分工合作,这对于日后进入职场具有重要意义。 此外,学科竞赛是提高学生综合能力的一种途径。竞赛项目通常会涉及到理论知识、实际操作和创新思维等多个方面,要求参赛者具备全面的素质。在竞赛过程中,学生不仅需要展现自己的专业知识,还需要具备创新意识和解决问题的能力。这种全面的综合能力培养对于未来从事各类职业都具有积极作用。 此外,学科竞赛可以为学生提供展示自我、树立信心的机会。通过比赛的舞台,学生有机会展现自己在专业领域的优势,得到他人的认可和赞誉。这对于培养学生的自信心和自我价值感非常重要,有助于他们更加积极主动地投入学习和未来的职业生涯。 最后,学科竞赛对于个人职业发展具有积极的助推作用。在竞赛中脱颖而出的学生通常能够引起企业、研究机构等用人单位的关注。获得竞赛奖项不仅可以作为个人履历的亮点,还可以为进入理想的工作岗位提供有力的支持。
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值