Saturday, November 22, 2025

OpenSSH : SFTP only + Chroot

 

OpenSSH : SFTP only + Chroot

 

Configure SFTP only + Chroot.
Some users who are applied this setting can access only with SFTP and also applied chroot directory.

[1]For example, Set [/home] as the Chroot directory.
# create a group for SFTP only

root@dlp:~# 
groupadd sftp_users

# apply to a user [trixie] for SFTP only as an example

root@dlp:~# 
usermod -aG sftp_users trixie

root@dlp:~# 
vi /etc/ssh/sshd_config
# line 117 : comment out and add a line like below

#
Subsystem sftp /usr/lib/openssh/sftp-server
Subsystem sftp internal-sftp
# add to last line

Match Group sftp_users
    X11Forwarding no
    AllowTcpForwarding no
    ChrootDirectory /home
    ForceCommand internal-sftp

root@dlp:~# 
systemctl restart ssh
[2]Try to access with a user and verify the settings.
trixie@node01:~$ 
ssh trixie@dlp.srv.world

trixie@dlp.srv.world's password:
This service allows sftp connections only.
Connection to dlp.srv.world closed.   # denied as settings

trixie@node01:~$ 
sftp trixie@dlp.srv.world

trixie@dlp.srv.world's password:
Connected to dlp.srv.world.
sftp>

No comments:

Post a Comment