Your browser does not allow storing cookies. We recommend enabling them.

Tectia

ssh-dummy-shell

SSH-DUMMY-SHELL(1)             SSH2            SSH-DUMMY-SHELL(1)


NAME
       ssh-dummy-shell - Ultimately restricted shell


SYNOPSIS
       ssh-dummy-shell [-c sftp-shell]


DESCRIPTION
       ssh-dummy-shell is used to provide access to systems where
       only file transfer functionality is permitted.  Users with
       file-transfer-only  access  can  have  ssh-dummy-shell  as
       their user shell.  When executed without  any  parameters,
       the  program waits for the user to press any key and exit.
       The only way to execute programs with  ssh-dummy-shell  is
       to  give  them  as  command-line  parameters  with  the -c
       option.  Even then, sft-server-g3 is the only allowed com-
       mand.


OPTIONS
       -c command
            The  parameter  is executed as a shell command.  Only
            the sftp-server command is allowed.  Any  other  com-
            mand causes ssh-dummy-shell to exit immediately.


RETURN STATUS
       ssh-dummy-shell returns the return value of the given com-
       mand.  If no command is given, 0 will be returned on exit.


FILES
       /opt/tectia/etc/ssh_dummy_shell.out
              Contains the message that is shown to the user when
              ssh-dummy-shell is executed without any parameters.


AUTHORS
       Tectia Corporation

       For more information, see http://www.tectia.com.


SEE ALSO
       sftpg3(1), sshg3(1), sshd2(8)


 

 
Highlights from the SSH.COM blog:

  • Cryptomining with the SSH protocol: what big enterprises need to know about it

    Cryptomining malware is primarily thought of as targeting desktops and laptops and is used to hijack system resources to mine cryptocurrency.
    Read more
  • SLAM the door shut on traditional privileged access management

    Did you know that something as trivial-sounding as granting access for your developers or third parties to a product development environment can throw a gorilla-sized monkey wrench into your operations and productivity?
    Read more
  • We broke the IT security perimeter

    Everyone understands the concept of a security perimeter. You only gain access if you are identified and authorized to do so.
    Read more