summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
Diffstat (limited to 'net-misc/scponly/files/SECURITY')
-rw-r--r--net-misc/scponly/files/SECURITY63
1 files changed, 0 insertions, 63 deletions
diff --git a/net-misc/scponly/files/SECURITY b/net-misc/scponly/files/SECURITY
deleted file mode 100644
index a1f6c9c8c71c..000000000000
--- a/net-misc/scponly/files/SECURITY
+++ /dev/null
@@ -1,63 +0,0 @@
-SECURITY
-
-Here are a few important things to know about security and scponly. This is a
-brief attempt to document what should be done to correctly secure scponly.
-
-1) Configure scponly to use a chroot
-
-2) Configure scponly to use as few extra options and services as possible. If
- possible, try to use something similar to the following:
-
- ./configure --disable-wildcards --enable-chrooted-binary \
- --disable-gftp-compat --with-sftp-server=/path/to/sftp-server
-
-3) NOTE THE FOLLOWING SECURITY RISKS:
-
- -- by enabling wildcards, there is a slightly higher chance of an exploit
- -- by enabling scp and/or scp compatibility, more programs will need to be
- installed in the chroot which increases the risk
- -- CAUTION: by enabling svn/svnserve the user WILL BE ABLE TO EXECUTE
- SCRIPTS OR PROGRAMS INDIRECTLY! svn and svnserve will try to execute
- pre-commit, post-commit hooks, as well as a few others. These files
- have specific filenames at specific locations relative to the svn
- repository root. Thus, unless you are *very* careful about security,
- the user WILL BE ABLE TO EXECUTE SCRIPTS OR PROGRAMS INDIRECTLY! This
- can be prevented by a careful configuration.
- -- The following programs use configuration files that might allow the user
- to bypass security restrictions placed on command line arguments:
-
- svn, svnserve, rsync, and unison
-
-4) Make sure that all files required for the chroot have the IMMUTABLE and
- UNDELETABLE bits set. Other bits might also be prudent. See: man 1 chattr.
-
-5) Only put files in the chroot that are absolutely essential to its
- functionality.
-
-6) Make sure the following directories are locked down appropriately:
-
- ~/.ssh, ~/.unison, ~/.subversion
-
- NOTE: depending on file permissions in the above, ssh, unison, and
- subversion may not work correctly.
-
-7) Make sure that every directory the users have write permissions to are
- on a filesystem that is mounted NODEV, NOEXEC. Eg. Make sure that they
- cannot execute files that they have permissions to upload. They should
- also not need permissions to create any devices. If the user can't execute
- any files that he has access to upload, then you need not worry about the
- security problems referencing svn/svnserve above!
-
-8) Monitor your logs! If you start to see something funny, odd, or strange in
- the logs, please let us know so that we can investigate and make sure any
- problems are resolved.
-
-9) Stay up-to-date with the scponly installs. We don't have releases too
- often, but the changes we do make are usually important!
-
-10) Enjoy!
-
-Lastly, if you have other suggestions and thoughts that would help secure an
-scponly install, please send them to us!
-
-Thanks for using scponly!