sFTP only and chroot user #359
-
Hi, first let me say thanks for all you have done on ContainerSSH, it's a really cool thing! We have a specific real-world use case where we deal with old equipment which uses only user and password authenticated sFTP to read files which need to be processed and then write the results after processing. We would really like to use containerssh under kubernetes to create a more secure sftp system which dumps each user's sFTP session in a chroot directory containing only their files. If I can mount a network file share in the guest image which contains a directory tree organised like Furthermore, because we are stuck with password auth, is there any provision in containerssh for network-level brute force protection such as with SSHGuard or Fail2ban? Thanks! |
Beta Was this translation helpful? Give feedback.
Replies: 3 comments 7 replies
-
Hey @StaringSkyward thank you very much for your feedback. To answer your question:
I hope this helps, please feel free to post in this thread or join our Slack channel. |
Beta Was this translation helpful? Give feedback.
-
The fail2ban thing is probably a higher level problem. I'd like to see something like it watch logs by getting them pushed to it via something like fluentd at more of a cluster wide level, and be able to then tweak k8s networkpolicy objects. Could be made more generic and work across vm's and k8s's. But not really in the scope of this project I think. |
Beta Was this translation helpful? Give feedback.
-
Marking as answered. Thanks to everyone for your help! |
Beta Was this translation helpful? Give feedback.
The fail2ban thing is probably a higher level problem. I'd like to see something like it watch logs by getting them pushed to it via something like fluentd at more of a cluster wide level, and be able to then tweak k8s networkpolicy objects. Could be made more generic and work across vm's and k8s's. But not really in the scope of this project I think.