Implementing chroot directory for sftp users

I am running OpenSSH64 on a Windows 2012 environment. OpenSSH64 is running and I can access the server. I have modified the sshd_config file with no success.

I have made the following changes:

Subsystem sftp C:\OpenSSH-Win64\sftp-server.exe
Match User sftponly-user
X11Forwarding no
AllowTcpForwarding no
ForceCommand internal-sftp
ChrootDirectory %h 

I have also tried

ChrootDirectory C:\User_Specific_Directory\ 

We are trying to generate logs to verify that the changes we make in the sshd_config file are being applied. However, we receive the following error in the log:

3784 11:00:17 087 error: accept: The operation completed successfully. 

Does anyone have a working example of chrooting a user to a specific directory?

1

2 Answers

This feature has not been implemented in OpenSSH for Windows (basically because it's hard):

1

Default OpenSSH config file location: C:\ProgramData\ssh

File name: ssh_config

Match User <windows_login_user_name> ChrootDirectory C:\0-Websites\myapp.com X11Forwarding no PermitTTY no AllowTcpForwarding no ForceCommand sftp-server.exe

NOTE: All user name should be lower case.

Your Answer

Sign up or log in

Sign up using Google Sign up using Facebook Sign up using Email and Password

Post as a guest

By clicking “Post Your Answer”, you agree to our terms of service, privacy policy and cookie policy

You Might Also Like