Solved

VSFTP Server Setup

Posted on 2004-04-21
6
1,410 Views
Last Modified: 2010-03-18
I am having a bit of trouble with the VSFTP configuration. Basically, if I try and log in with a created user and the correct password, it says authorization failed. My configuration file is as follows (minus comments) full file (with comments) at http://24.72.35.15/vsftpd.conf. It is based off some how-to or another.

anonymous_enable=NO
local_enable=YES
write_enable=YES
local_umask=022
dirmessage_enable=YES
xferlog_enable=YES
connect_from_port_20=YES
nopriv_user=nobody
ascii_upload_enable=YES
ftpd_banner=Welcome dude.
listen=YES
chroot_local_user=YES

Any suggestions?
0
Comment
Question by:TheASP
6 Comments
 
LVL 8

Expert Comment

by:da99rmd
Comment Utility
try starting vsftp with -d for debug or -v for verbouse and look att the err mess.

or try reading the log an maybe increasing the logging.

/Rob
0
 

Author Comment

by:TheASP
Comment Utility
I've decided to go with proftp. Thanks for you time, though.

ASP
0
 
LVL 9

Expert Comment

by:Alf666
Comment Utility
What do you have in the file /etc/pam.d/vsftpd ?

It should show the following :

#%PAM-1.0

# Uncomment this to achieve what used to be ftpd -A.
# auth       required     pam_listfile.so item=user sense=allow file=/etc/ftpchroot onerr=fail

auth     required       pam_listfile.so item=user sense=deny file=/etc/ftpusers onerr=succeed
# Uncomment the following line for anonymous ftp.
#auth    sufficient     pam_ftp.so
auth     required       pam_unix2.so
auth     required       pam_shells.so
account  required       pam_unix2.so
password required       pam_unix2.so
session  required       pam_unix2.so

This also means that your users must have a shell which is listed in /etc/shells.

If you do not want that, comment out the line :

auth     required       pam_shells.so

0
 

Author Comment

by:TheASP
Comment Utility
I installed ProFTPD instead. Thanks for trying to help.

(Requested refund)

ASP
0
 

Accepted Solution

by:
PashaMod earned 0 total points
Comment Utility
Closed, 200 points refunded.
PashaMod
Community Support Moderator
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
Note: for this to work properly you need to use a Cross-Over network cable. 1. Connect both servers S1 and S2 on the second network slots respectively. Note that you can use the 1st slots but usually these would be occupied by the Service Provide…
Internet Business Fax to Email Made Easy - With eFax Corporate (http://www.enterprise.efax.com), you'll receive a dedicated online fax number, which is used the same way as a typical analog fax number. You'll receive secure faxes in your email, fr…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

6 Experts available now in Live!

Get 1:1 Help Now