[Bug 575502] New: Review Request: scponly - Limited shell for secure file transfers
bugzilla at redhat.com
bugzilla at redhat.com
Sun Mar 21 02:26:05 UTC 2010
Please do not reply directly to this email. All additional
comments should be made in the comments box of this bug.
Summary: Review Request: scponly - Limited shell for secure file transfers
https://bugzilla.redhat.com/show_bug.cgi?id=575502
Summary: Review Request: scponly - Limited shell for secure
file transfers
Product: Fedora
Version: 12
Platform: All
OS/Version: Linux
Status: NEW
Severity: medium
Priority: low
Component: Package Review
AssignedTo: nobody at fedoraproject.org
ReportedBy: rebus at seznam.cz
QAContact: extras-qa at fedoraproject.org
CC: notting at redhat.com, fedora-package-review at redhat.com
Estimated Hours: 0.0
Classification: Fedora
Spec URL: http://rebus.webz.cz/d/scponly.spec
SRPM URL: http://rebus.webz.cz/d/scponly-4.8-1.fc12.src.rpm2
License: BSD
Description:
scponly is an alternative 'shell' for system administrators
who would like to provide access to remote users to both
read and write local files without providing any remote
execution privileges. Functionally, it is best described
as a wrapper to the "tried and true" ssh suite of applications.
Hello, please would be someone so kind and willing to do review
of the scponly package and approve it for fedora?
I do not have any package in Fedora sofar so I would humbly ask for sponsoring
as well.
Output from the rpmlint :
$rpmlint scponly-4.8-1.fc12.src.rpm scponly-4.8-1.fc12.i686.rpm
scponly-debuginfo-4.8-1.fc12.i686.rpm
scponly.i686: E: setuid-binary /usr/sbin/scponlyc root 04755
scponly.i686: E: non-standard-executable-perm /usr/sbin/scponlyc 04755
3 packages and 0 specfiles checked; 2 errors, 0 warnings.
Please note the setuid is needed to be able to perform the chroot operation.
Commands itself are never executed with uid 0 by the scponly.
Thank you.
Michal Ambroz
--
Configure bugmail: https://bugzilla.redhat.com/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug.
More information about the package-review
mailing list