Solved

vsftpd jail in rhel and mysql replica

Posted on 2013-12-29
3
377 Views
Last Modified: 2016-03-18
Dear Experts:

We are having Sugar CRM deployed on LAMP on premise which is of production we would like to share the present developed custom code and the mysql database for the new service provider to review the code and database for which Have created the user with the home directory in different path /var/www/html/ws1 and copied all the directory /sub-directory and files onto this and wanted to give the ftp access to this.

Please suggest me is this a right way, but want to jail the user limiting only to this home. can any body help how to do this.

2, planned to create a new database and take the existing production server database and import to this new database, please suggest me is this correct way of doing.
0
Comment
Question by:D_wathi
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 40

Accepted Solution

by:
omarfarid earned 500 total points
ID: 39744451
Below will help in restricting user from browsing / accessing other directories on the system. The line below are taken from the man page:

System user accounts normally have the ability to browse the complete filesystem as though they were logged onto the terminal (depending on directory permissions). To block all users from this activity, they can be chroot jailed into their home directories. This means they will be locked inside their own home directories and can't view or access the rest of the filesystem.

chroot_local_user=YES

Note !!       Using chroot_local_user is handy for allowing users to access their "public_html" directories on a publicly shared web server.

Users can also be selectively jailed to their home directories.

chroot_list_enable=YES
chroot_list_file=/etc/vsftpd/chroot_list

Note !!       If "chroot_list_enable=YES", then the /etc/vsftpd.chroot_list file contains a selective list of users that are jailed to their home directories. If "chroot_local_user=YES" is also set, then the entries in the /etc/vsftpd.chroot_list are users that are not jailed; the opposite effect."
0
 

Author Closing Comment

by:D_wathi
ID: 39779168
thank you
0
 
LVL 40

Expert Comment

by:omarfarid
ID: 39781212
Welcome :)
0

Featured Post

Secure Your WordPress Site: 5 Essential Approaches

WordPress is the web's most popular CMS, but its dominance also makes it a target for attackers. Our eBook will show you how to:

Prevent costly exploits of core and plugin vulnerabilities
Repel automated attacks
Lock down your dashboard, secure your code, and protect your users

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Nothing in an HTTP request can be trusted, including HTTP headers and form data.  A form token is a tool that can be used to guard against request forgeries (CSRF).  This article shows an improved approach to form tokens, making it more difficult to…
This post contains step-by-step instructions for setting up alerting in Percona Monitoring and Management (PMM) using Grafana.
This tutorial will teach you the core code needed to finalize the addition of a watermark to your image. The viewer will use a small PHP class to learn and create a watermark.
If you're a developer or IT admin, you’re probably tasked with managing multiple websites, servers, applications, and levels of security on a daily basis. While this can be extremely time consuming, it can also be frustrating when systems aren't wor…

630 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question