Select Your Language

Infrastructure and Management

Cloud Computing

Storage

Runtimes

Integration and Automation

  • Comments
  • oddjob_mkhomedir umask.

    Posted on

    Hi,

    I am trying to set up a SFTP server with a chroot jail.
    User authentication on the system is integrated with Active Directory (configured with Realmd).

    I am using the below homedir configuration on my sssd.conf:

    override_homedir = /home/%u/sftp
    

    The above works fine, /home//sftp is created by oddjob_mkhomedir, owned by and with permissions extracted from the UMASK config on /etc/login.defs.

    drwxr-xr-x 2 test.user77 domain users 4096 Jul 26 11:04 /home/test.user77/sftp/
    

    The problem I am facing is that /home also gets created on the fly, owned by root but with 711 permissions. I don't know where oddjob gets those permissions from, as the root umask is 022.

    drwx--x--x 3 root root 4096 Jul 26 11:04 /home/test.user77
    

    That's messing with my SFTP chroot jail as it's expecting that dir to be 755 instead of 711.

    Is there any way of telling sssd/oddjob_mkhomedir to use a different umask for those "intermediate" directories?

    by

    points

    Responses

    Red Hat LinkedIn YouTube Facebook X, formerly Twitter

    Quick Links

    Help

    Site Info

    Related Sites

    © 2026 Red Hat