From 797e3d117f8b4cfed5f066ef88f28826eb8f8b41 Mon Sep 17 00:00:00 2001 From: Damien Miller Date: Mon, 19 May 2008 14:27:42 +1000 Subject: - (djm) OpenBSD CVS Sync - djm@cvs.openbsd.org 2008/04/04 05:14:38 [sshd_config.5] ChrootDirectory is supported in Match blocks (in fact, it is most useful there). Spotted by Minstrel AT minstrel.org.uk --- sshd_config.5 | 38 ++++++++++++++++++++++++++++++++++++-- 1 file changed, 36 insertions(+), 2 deletions(-) (limited to 'sshd_config.5') diff --git a/sshd_config.5 b/sshd_config.5 index 245ed946f..be3869713 100644 --- a/sshd_config.5 +++ b/sshd_config.5 @@ -34,8 +34,8 @@ .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. .\" -.\" $OpenBSD: sshd_config.5,v 1.84 2008/03/25 11:58:02 djm Exp $ -.Dd $Mdocdate: March 25 2008 $ +.\" $OpenBSD: sshd_config.5,v 1.85 2008/04/04 05:14:38 djm Exp $ +.Dd $Mdocdate: April 4 2008 $ .Dt SSHD_CONFIG 5 .Os .Sh NAME @@ -210,6 +210,29 @@ in-process sftp server is used (see .Cm Subsystem for details). .Pp +Please note that there are many ways to misconfigure a chroot environment +in ways that compromise security. +These include: +.Pp +.Bl -dash -offset indent -compact +.It +Making unsafe setuid binaries available; +.It +Having missing or incorrect configuration files in the chroot's +.Pa /etc +directory; +.It +Hard-linking files between the chroot and outside; +.It +Leaving unnecessary +.Pa /dev +nodes accessible inside the chroot (especially those for physical drives); +.It +Executing scripts or binaries inside the chroot from outside, either +directly or through facilities such as +.Xr cron 8 . +.El +.Pp The default is not to .Xr chroot 2 . .It Cm Ciphers @@ -340,6 +363,11 @@ Specifying a command of will force the use of an in-process sftp server that requires no support files when used with .Cm ChrootDirectory . +Note that +.Dq internal-sftp +is only supported when +.Cm UsePrivilegeSeparation +is enabled. .It Cm GatewayPorts Specifies whether remote hosts are allowed to connect to ports forwarded for the client. @@ -563,6 +591,7 @@ keyword. Available keywords are .Cm AllowTcpForwarding , .Cm Banner , +.Cm ChrootDirectory , .Cm ForceCommand , .Cm GatewayPorts , .Cm GSSApiAuthentication , @@ -801,6 +830,11 @@ server. This may simplify configurations using .Cm ChrootDirectory to force a different filesystem root on clients. +Note that +.Dq internal-sftp +is only supported when +.Cm UsePrivilegeSeparation +is enabled. .Pp By default no subsystems are defined. Note that this option applies to protocol version 2 only. -- cgit v1.2.3