B
bcorcoran
Guest
I've been having this problem since 10.1.1, and thought maybe upgrading to 10.3.1 would solve it... no such luck.
My issue is that if I set /sbin/nologin or /bin/bash (chrooted) as the shell to enable SFTP access with no/limited shell access, the user can not log in. If I give them any other normal shell, i.e. /bin/sh, /bin/bash, /bin/tcsh, etc they can log in just fine... but that's not secure enough for me.
Is there any sort of "plesk integrity" check I can do that will check all binaries related to plesk?
In /var/log/secure, I'm not seeing anything odd other than the session closes right after it's started:
I've seen other threads dealing with this subject on older versions of Plesk, but they remained mostly unresolved. Any ideas as to how I can fix this?
My issue is that if I set /sbin/nologin or /bin/bash (chrooted) as the shell to enable SFTP access with no/limited shell access, the user can not log in. If I give them any other normal shell, i.e. /bin/sh, /bin/bash, /bin/tcsh, etc they can log in just fine... but that's not secure enough for me.
Is there any sort of "plesk integrity" check I can do that will check all binaries related to plesk?
In /var/log/secure, I'm not seeing anything odd other than the session closes right after it's started:
Code:
Oct 9 06:17:26 server sshd[32392]: Accepted password for USERNAME from x.x.x.x port 52843 ssh2
Oct 9 06:17:26 server sshd[32392]: pam_unix(sshd:session): session opened for user USERNAME by (uid=0)
Oct 9 06:17:26 server sshd[32394]: subsystem request for sftp
Oct 9 06:17:26 server sshd[32392]: pam_unix(sshd:session): session closed for user USERNAME
I've seen other threads dealing with this subject on older versions of Plesk, but they remained mostly unresolved. Any ideas as to how I can fix this?
Last edited by a moderator: