On Mon, Oct 30, 2000 at 01:18:27PM +0100, m_g_m@gmx.net wrote: > Yes, > i thought it would be good to use linux-ftpd cause it was said it's more > secure... personally i like to use the easy proftpd more (although the > configuring is a little too easy or abstract and doesn't work always as it should > and I don't get a notice [as I had with my Red Hat box] if the proftd really > restarted when i typed 'proftpd restart'). > The other thing i noticed: ftpd has no 'ftpwho'-command which was a pretty > nice feature @ proftpd and wu-ftpd(which i don't like cause it adds > bin/etc/pub-dir to /home/ftp)... > Before I stay with proftd I'd like (at least) to test the 'ftpd'.... i recommend the linux port of the current OpenBSD ftpd, ftpd version 0.3.2, you can find it on freshmeat. it has a built in ls so you don't have to create chroot environments. its also VERY easy to configure: /etc/ftpchroot - list of usernames who shall be chrooted to $HOME. /etc/ftpusers - list of usernames who shall be denied ftp access. /etc/ftpwelcome - message to be displayed to users when they connect. (this does need to be copied to the chroot environment i think...) other then that its all command line arguments you put in /etc/inetd.conf. walk through the man page and these are very easy to pick from. as for ftpwho, you can add the -U switch to ftpd in /etc/inetd.conf and ftp logins will show up in the regular who/w output. (it logs the login to /var/run/utmp) to create anonymous ftp i think all that is required is creating a ftp user with locked passwd and a valid shell (use nologin or something that does nothing and added to /etc/shells) also add the ftp user to /etc/ftpchroot. -- Ethan Benson http://www.alaska.net/~erbenson/
Attachment:
pgpWDiLtmLeGX.pgp
Description: PGP signature