restrict SSH to user home dir

yoshikiwei

Verified User
Joined
Jul 2, 2004
Messages
13
currently when i enable SSH for a user account in directadmin
the user gets the SSH access, but I would like to restrict their access to the home directory

meaning users inside /home/TestUser cannot go up to a higher level which is /home

any idea how should i do this ?
 
You might be able to find some posts about jailing ssh either on this or other forums.

It's not simple, because once you jail a user s/he has no access to any standard linux commands that aren't built in to the shell.

Jeff
 
read about jailing
seems like a tedious task
and was afraid it might change some DA defalt settings

is it safe to just allow my user to use SSH ?
where they can roam around the server but with default settings by Redhat 9.0 and the latest DA

basically I don't mind them peeping at the system files
but wouldn't want them to modify or execute dangerous commands like httpd stop or shutting down system

i believe the default rights and permission of redhat 9.0 and DA should be safe enough ?
pls correct me if I am wrong
 
Default rights and permissions are safe for trusted users.

We don't allow general acocunt ssh access to our shared hosting servers, but we do make exceptions.

Jeff
 
Back
Top