Server :: Restrict FTP Users From Accessing 1 Folder Only
Jul 1, 2010
I'd like to restricting my ftp users to access 1 particular folder.
we have a root folder called /home everyone has aces to that so they can operate.
but then there is /home/config how can i restrict certain users from access /config folder, since this is containing sensitive files I would like for no one else but my self to be able to access it.
I've setup a FTP server in OpenSUSE 11.1 with KDE 3.5.x. (Pure-ftpd) But when I connect with an user to the FTP server I can browse to all folders on the OPENSUSE system, how can I setup one folder for all users and restrict the FTP connection to that folder only??
i have seven department in my office. i want to restricte web sites for all the departments but not same web sites for all the departments i.e. different sites for different departments.i have no idea about this issue.
I've just added my wife as a seperate user on my desktop and have a question about shared network folders. So /etc/fstab mounts network folders from a second computer and until today I've mounted them to /home/David/NetworkData
This of course means that when my wife logs in she won't see them since they're not mounted to her home folder. So what folder should I use and what tricks so that we both have it visible and accessible in Places from the top menu?
I have configured rssh 2.3 with openssh 5.8 on RHEL 5.6 64 bit to restrict the users to scp and sftp. When i try to sftp or scp it gives error connection closed. After long googling tried different solutions like add missing libraries, setuid to rssh_helper. I had full copy of /lib to /chroot/lib and /chroot/lib64 but no success. conf and log files are below for reference.
I want to limit delete of a particular folder in the user's home folder and to restrict any add/change/delete on files in that restricted directory. /home/myuser /home/myuser/_protected //no delete /home/myuser/_protected/1.txt //only read How can I do that on Ubuntu server?
I've got a lamp solution deployed that I didn't write but I do have root access to the server. What might be the best way to determine the number of concurrent users accessing this web app throughout the day?
I would like to experiment a "green" idea of virtual desktop where multiple users are served by a single powerful machine.
I have a server running 24/7. The monitor of this machine is turned off most of the time and the OS is on the login screen.
Other users, in the same local network, use less powerful machines, which could be a thin client or an old Pentium 3 machine. They access their accounts remotely and work with the GUI as if they were sitting in front of the server. Each user sees their own desktop (different themes, screen resolution, etc.). And of course it can happen that several users could log in at the same time.
The usage is modest: mostly web browsing and the usual default applications (office, wine, gimp, etc.). In particular no games or any demanding applications. The users want to use their desktop in graphical mode only.
Question: How do we call this way of using a server? Is it possible with Ubuntu? And how to implement it?
Everytime I start Rhythmbox it starts to scan my USB HardDrive (which contains 50,000+ files) for media. I searched around, and it seems that there is nothing one can do stop that using any Rhythmbox options, switches, etc. Is there a way to prevent a process (in this case Rhythmbox)from using a certain resource (the path to my USB Drive)? I'm thinking APPArmor or SELinux may be the way to do it.
i heard that if pam is denying the user and ftp is allowing the user the user can get the access it means that ftp conf file is stronger than host.deny
I have setup a NFS server and this the content of /etc/exports at the server with IP A.B.C.D1 is:/home/shared A.B.C.D2(rw,no_root_squash)Problem is, only the root at A.B.C.D1 and A.B.C.D2 can write to that folder.
I've installed Ubuntu Desktop Ed 9 and I want to add a user account that would be very restricted. I would only want them to access the internet and run several programs. I do not want them to have access to the destkop, anything under preferences, administration etc... Is this possible?
I was just wondering how do i restrict someone from entering other files. Like other peoples files & the system files. My users are in /home/. I am running ubuntu 10.10.So how do i restrict access to other folders. Because i dont want other people looking inside others files or messing up my linux files.
How would i go about restricting users to there home dir in sftp and in ssh so that they can not go poking about other dir and files thats above there home dir ?Operating systemCentOS Linux 5.4 Kernel and CPULinux 2.6.18-194.8.1.el5.028stab070.5PAE on i686 Also it will have to be a low resource usage as i dont have much memory on it
i added users to the group om PDC after it i shared folder on linux server and given permission for users from this group, the folder is showed correct. After it i removed users from group, but the folder is accessible. Where is mistake?
[global] workgroup = STSCOMPANY password server = *
I have a Ubuntu 10.10 server; I have created several users and wish them to have their own web space (with a unique domain name for each). I have therefore created www folders within their home folder and created new Virtual Servers to host each domain name and point to the users www folder in their home folder. They can then use an FTP client to upload files. This all works well.
However, I would like to stop a user from going back up a level and traversing the tree.They can currently go back up to /home and see other users names.
I work for a school district. We are running in a Windows environment with a Windows domain. It was asked of me if I could get an Ubuntu system on our domain and running without issue, as we would like to tinker with the idea of slowly introducing Ubuntu systems to the network.I have a test system here. I added it to the domain using Likewise-Open. I have Samba installed, etc. Here's the next curve ball that I need answered.All user documents are stored in their individual shares on the same Windows server. In Windows, we use re-directed My Documents, so their My Documents actually points to \serverusersob_dole instead of C:/Documents and Settings/Bob Dole/My Documents.
How can we do this in Ubuntu? I don't care if it re-maps the home directory or creates a folder on the desktop that is linked. Either way, I want to log in to ANY Ubuntu system and blam - I have a link to \windowsserverusersmy_share. I want any user on the domain to be able to do that to any Ubuntu system and have a link to THEIR folder on the Windows server.
I have a debian-based ftp server running that I have created a few user accounts on. I will have clients uploading files to the server via ftp soon, and I need a way to restrict their access to only their home folders. I am not familiar with chroot, but from what I read, it can be used to restrict a user to their home folder, and that sounds perfect. How can I do this?
I have an Ubuntu 11.04 instance running on Amazon EC2. I am currently using it as an SSH tunnel/SOCKS proxy. Most of my Net activity is on a Windows 7 machine running PuTTY. This setup is working very well. So well that a few of my friends have expressed interest in accessing it. Question is, how do I share this proxy, without giving away my private key and root access? I would like to limit users to only being able to set up an SSH tunnel/SOCKS proxy, with no shell access. What other security measures would you recommend for such a setup? I googled a bit and saw references to rbash and chroot. I have already changed the SSH port, and set the EC2 firewall to allow inbound SSH only from my ISP's address range. My friends use the same ISP. They would probably be running Windows 7/Vista, and PuTTY too.
I am not sure whether it's possible or not. We running squid proxy server for our office. We restrict users using ACL to access the internet. There is some who do the followings:
1. Create a own proxy in there box who has the internet access.
2. Other users use those box as proxy and access to the internet.
I want to know is it possible in Sendmail to restrict some users from sending / receiving mail to / from outside world i.e. they should be able to send and receive mails only from local domain.
I want the users to access servers via ssh public key only. By default they don't know their initial password and do need to change that when performing administrative tasks.For changing their passwords without knowing the old they need to switch to root for this special case.The only case it seems I don't have control is that users can not only change their password but also the password of other peoples. Does someone sees a solution (without apparmor/selinux and special /usr/bin/passwd.sh) to restrict users to only change their password?I miss the feature of using environment variables in sudoers file.