nella manpage di vsftpd avevo trovato questo

codice:
passwd_chroot_enable
    If enabled, along with chroot_local_user , then a chroot() jail location may be specified on a per-user basis.
Each user's jail is derived from their home directory string in /etc/passwd.
The occurrence of /./ in the home directory string denotes that the jail is at that particular location
in the path.
link
http://vsftpd.beasts.org/vsftpd_conf.html

mentre in un'altra discussione avevo trovato questo
Very valid points about bending the use for the system. I'm doing it because I need to run with valid mail accounts as well as an ftp repository. The users can't do anything else because they're explicitly locked out of ssh and so on.

In the end I just decide to bite the bullet and mangled the passwd file with:
/home/user/ftp/./../

Which seems to work just fine. So far. Heck, I have backups!
link
http://www.linuxquestions.org/questi...uestion-37978/

stavo cercando il modo di chrootare un utente ftp non nella sua home, ma in una sottocartella.

per esempio

/home/user/ftp

dove

/home/user

è la home dell'utente...