Openssh Sftp Server
- Install / Initial Config
- NTP / SSH Server
- DNS / DHCP Server
- Storage Server
- Virtualization
- Container Platform
- Cloud Compute
- Directory Server
- Web Server
- Database
- FTP / Samba / Mail
- Proxy / Load Balance
- Monitoring
- Security
- Lang / Development
- Desktop / Others
- Others #2
- Bacula - Backup
- Memcached - Memory Cache
- RabbitMQ - Message Broker
- Git - Revision Control
- Subversion - Revision Control
- Ansible - Config Manage
- PXE Boot- PXE Server
- Pacemaker - HA Cluster
- OpenVPN - VPN Server
- WireGuard - VPN Server
- Rsyslog - Syslog Server
- LVM - LVM Manage
- NextCloud - Cloud Storage
Chrootdirectory Sftp
The OpenSSH server configuration is typically called something like /etc/ssh/sshdconfig. Find this file and open it in an editor. First we’ll make sure it will support SFTP in a chrooted environment. Search for a existing Subsystem sftp statement or insert it if it’s missing. There are different ways to lock a user into his home directory. A very special case is to grant sftp-only access, which does not require a full chroot jail to be set up. The sftp subsystem built into openssh allows a simple setup of a user locked into his home directory.