http://scie.nti.st/2008/8/19/1-minute-post-hostname-as-screen-window-title/
In short, add this line to the remote host's .bashrc:
[ "$TERM" = "screen" ] && PROMPT_COMMAND='echo -ne "\033k$HOSTNAME\033\\"'
July 31, 2017
July 20, 2017
Setting ssh server to an user to only SFTP to the user's home directory
Add the following to the end of the /etc/ssh/sshd_config file:
Subsystem sftp internal-sftp # This section must be placed at the very end of sshd_config Match Group sftponly ChrootDirectory %h ForceCommand internal-sftp AllowTcpForwarding no
This means that all users in the ‘sftponly’ group will be chroot’d to their home directory, where they only will be able to run internal SFTP processes.
Now you can create the group sftponly by running the following command:
$ groupadd sftponlySet a user’s group:
$ usermod steve -g sftponlyTo deny SSH shell access, run the following command:
$ usermod steve -s /bin/falseAnd set the user’s home directory:
$ sudo chown root /home/steve
$ sudo chmod go-w /home/steve
$ sudo mkdir /home/steve/writable
$ sudo chown steve:sftponly /home/steve/writable
$ sudo chmod ug+rwX /home/steve/writable
Finally, you probably need to restart SSH$ service ssh restart
The SSH part should now be in order, but you should make sure that file permissions also are correct. If the chroot environment is in a user’s home directory both /home and /home/username must be owned by root and should have permissions along the lines of 755 or 750.
In other words, every folder leading up to and including the home folder must be owned by root, otherwise you will get the following error after logging in:
Write failed: Broken pipe Couldn't read packet: Connection reset by peer
July 14, 2017
Subscribe to:
Posts (Atom)