<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: Restriction de commande Rsync par SSH</title>
	<atom:link href="http://fr.positon.org/restriction-de-commande-rsync-par-ssh/feed" rel="self" type="application/rss+xml" />
	<link>http://fr.positon.org/restriction-de-commande-rsync-par-ssh</link>
	<description></description>
	<lastBuildDate>Tue, 15 Mar 2022 14:49:21 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.7.1</generator>
	<item>
		<title>By: raf</title>
		<link>http://fr.positon.org/restriction-de-commande-rsync-par-ssh#comment-1639</link>
		<dc:creator><![CDATA[raf]]></dc:creator>
		<pubDate>Tue, 23 Apr 2019 08:21:33 +0000</pubDate>
		<guid isPermaLink="false">http://positon.org:81/?p=108#comment-1639</guid>
		<description><![CDATA[[Disclosure: I wrote sshdo which is described below]

There&#039;s a program for controlling which commands may be executed via incoming ssh. It&#039;s called sshdo. It can be used to precisely control uses of rsync as well as other commands, all at the same time. It&#039;s available for download at:

http://raf.org/sshdo/ (read manual pages here)
https://github.com/raforg/sshdo/

It has a training mode to allow all commands that are attempted, and a --learn option to produce the configuration needed to allow learned commands permanently. Then training mode can be turned off and any other commands will not be executed.

It also has an --unlearn option to stop allowing commands that are no longer in use so as to maintain strict least privilege as requirements change over time.

It is very fussy about what it allows. It won&#039;t allow a command with any arguments. Only complete shell commands can be allowed.

But it does support simple patterns to represent similar commands that vary only in the digits that appear on the command line (e.g. sequence numbers or date/time stamps).

It&#039;s like a firewall or whitelisting control for ssh commands.]]></description>
		<content:encoded><![CDATA[<p>[Disclosure: I wrote sshdo which is described below]</p>
<p>There&#8217;s a program for controlling which commands may be executed via incoming ssh. It&#8217;s called sshdo. It can be used to precisely control uses of rsync as well as other commands, all at the same time. It&#8217;s available for download at:</p>
<p><a href="http://raf.org/sshdo/" rel="nofollow">http://raf.org/sshdo/</a> (read manual pages here)<br />
<a href="https://github.com/raforg/sshdo/" rel="nofollow">https://github.com/raforg/sshdo/</a></p>
<p>It has a training mode to allow all commands that are attempted, and a &#8211;learn option to produce the configuration needed to allow learned commands permanently. Then training mode can be turned off and any other commands will not be executed.</p>
<p>It also has an &#8211;unlearn option to stop allowing commands that are no longer in use so as to maintain strict least privilege as requirements change over time.</p>
<p>It is very fussy about what it allows. It won&#8217;t allow a command with any arguments. Only complete shell commands can be allowed.</p>
<p>But it does support simple patterns to represent similar commands that vary only in the digits that appear on the command line (e.g. sequence numbers or date/time stamps).</p>
<p>It&#8217;s like a firewall or whitelisting control for ssh commands.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: dooblem</title>
		<link>http://fr.positon.org/restriction-de-commande-rsync-par-ssh#comment-1628</link>
		<dc:creator><![CDATA[dooblem]]></dc:creator>
		<pubDate>Mon, 18 Feb 2019 20:03:27 +0000</pubDate>
		<guid isPermaLink="false">http://positon.org:81/?p=108#comment-1628</guid>
		<description><![CDATA[Hello Tim,
rsync would be starded with the --sender option. With that how can it write any file on the server ?

Anyway, a better option now is to use rrsync

https://download.samba.org/pub/unpacked/rsync/support/rrsync]]></description>
		<content:encoded><![CDATA[<p>Hello Tim,<br />
rsync would be starded with the &#8211;sender option. With that how can it write any file on the server ?</p>
<p>Anyway, a better option now is to use rrsync</p>
<p><a href="https://download.samba.org/pub/unpacked/rsync/support/rrsync" rel="nofollow">https://download.samba.org/pub/unpacked/rsync/support/rrsync</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Tim Riker</title>
		<link>http://fr.positon.org/restriction-de-commande-rsync-par-ssh#comment-1622</link>
		<dc:creator><![CDATA[Tim Riker]]></dc:creator>
		<pubDate>Fri, 15 Feb 2019 22:15:16 +0000</pubDate>
		<guid isPermaLink="false">http://positon.org:81/?p=108#comment-1622</guid>
		<description><![CDATA[I would not recommend this approach. If you do this, then use remote user can rsync over a new .ssh/authorized_keys that removes the restrictions and have full shell access as root using that key.

Better to have the root user on the machine you want to backup, ssh as a non-root user to the machine you want the backups on and upload.]]></description>
		<content:encoded><![CDATA[<p>I would not recommend this approach. If you do this, then use remote user can rsync over a new .ssh/authorized_keys that removes the restrictions and have full shell access as root using that key.</p>
<p>Better to have the root user on the machine you want to backup, ssh as a non-root user to the machine you want the backups on and upload.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Allow only rsync and not ssh from remote server &#8211; Barchive</title>
		<link>http://fr.positon.org/restriction-de-commande-rsync-par-ssh#comment-1601</link>
		<dc:creator><![CDATA[Allow only rsync and not ssh from remote server &#8211; Barchive]]></dc:creator>
		<pubDate>Sat, 14 Jul 2018 18:43:40 +0000</pubDate>
		<guid isPermaLink="false">http://positon.org:81/?p=108#comment-1601</guid>
		<description><![CDATA[[&#8230;] http://positon.org/rsync-command-restriction-over-ssh [&#8230;]]]></description>
		<content:encoded><![CDATA[<p>[&#8230;] <a href="http://positon.org/rsync-command-restriction-over-ssh" rel="nofollow">http://positon.org/rsync-command-restriction-over-ssh</a> [&#8230;]</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: David Goodwin</title>
		<link>http://fr.positon.org/restriction-de-commande-rsync-par-ssh#comment-1195</link>
		<dc:creator><![CDATA[David Goodwin]]></dc:creator>
		<pubDate>Thu, 21 May 2015 12:08:22 +0000</pubDate>
		<guid isPermaLink="false">http://positon.org:81/?p=108#comment-1195</guid>
		<description><![CDATA[Thanks for the above - it was just what I needed. 

(I didn&#039;t know you could have a &#039;from&#039; bit in authorized_keys).]]></description>
		<content:encoded><![CDATA[<p>Thanks for the above &#8211; it was just what I needed. </p>
<p>(I didn&#8217;t know you could have a &#8216;from&#8217; bit in authorized_keys).</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Shahzad</title>
		<link>http://fr.positon.org/restriction-de-commande-rsync-par-ssh#comment-151</link>
		<dc:creator><![CDATA[Shahzad]]></dc:creator>
		<pubDate>Wed, 30 Jan 2013 18:07:35 +0000</pubDate>
		<guid isPermaLink="false">http://positon.org:81/?p=108#comment-151</guid>
		<description><![CDATA[&lt;p&gt;my user is no login, how can I use this for that user?&lt;br /&gt;
do I have to change my user setting on the server to be able to allow login?&lt;/p&gt;]]></description>
		<content:encoded><![CDATA[<p>my user is no login, how can I use this for that user?<br />
do I have to change my user setting on the server to be able to allow login?</p>
]]></content:encoded>
	</item>
</channel>
</rss>
