infrastructure/hosts/master.mirror.lewd.wtf/sftp_jail.nix

11 lines
196 B
Nix

{
services.openssh.extraConfig = ''
Match Group sftponly
ChrootDirectory /sftp_jail
ForceCommand internal-sftp
AllowTcpForwarding no
'';
users.groups.sftponly = {};
}