I have setup SFTP on our development box and would like to jail users into the /var/www/project folder
I have added the following to /etc/ssh/sshd_config
Match Group developers
ChrootDirectory /var/www/project
X11Forwarding no
AllowTCPForwarding no
ForceCommand /usr/lib/openssh/sftp-server
When I attempt to SFTP in, I receive error
Couldnt read packet: connection reset by peer
I thought that this might be a permissions issues, Ive chmod /usr/lib/openssh/sftp-server to 755 – still no luck
Any suggestions?
Best Answer
sorry i can't comment, so i have to answer directly.
the permissions with the build-in chroot system is a little bit tricky, i use the same method to create sftp only users:
part of my sshd_config:
where %u matches every username here
assuming the following path
permissions:
if a user logs the directroy listing of / shows "upload"