Solved

Setting up remote authenticated FTP access to /var/www/ on Fedora 5.0

Posted on 2006-10-27
2
462 Views
Last Modified: 2013-12-06
Not knowing too much about Linux I have set up a web server on Fedora 5.0., That was easy.

I need to upload/download/delete the web content with ftp remotely with a single username/password.   (just like every commercial web hosting service)  I know it's not secure and their are better options, but that's OK.

Question 1 - - - After starting vsftp, read access to a "pub" folder is enabled by default, but I can't even find "pub" in the file system.  What is the file system path to "pub" ?

Question 2 - - -How to I get the ftp server to point to /var/www/ ?  Paths are not part of the vsftpd.conf setup file
0
Comment
Question by:swbruce21
2 Comments
 

Author Comment

by:swbruce21
Comment Utility
OK, I found the PUB directory, so that leaves question 2

Question 2 - - -How to I get the ftp server to point to /etc/www/ ?  Paths are not part of the vsftpd.conf setup file
0
 
LVL 14

Accepted Solution

by:
ygoutham earned 250 total points
Comment Utility
hi

the default path of the vsftpd is defined in /etc/passwd file.  the pub that you are seeing is in /var/ftp/pub

change the file /etc/passwd and where it reads

ftp:x:...:...:/var/ftp/:/sbin/nologin to read like

ftp:x:...:...:/var/www:/sbin/nologin

please remember that the "..." that i have given is some number in the file change the "/var/ftp" to "/var/www/" or whatever directory that you want it to be pointed.

however it is not a good idea to have it in this manner as anyone who does an anonymous ftp to your website would see all the files.

instead create a user whose home directory would be /var/www

if you are using Internet Explorer to access the ftp folders, then you can click on FILE in the menu bar and select LOGIN AS to give a user name and password.

or if it is mozilla or some other browser, then you can try ftp://username@host.name.com to see a diaglog box appearing by default prompting you for the password which is a safer way to handle things.

goutham

0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Suggested Solutions

Little introduction about CP: CP is a command on linux that use to copy files and folder from one location to another location. Example usage of CP as follow: cp /myfoder /pathto/destination/folder/ cp abc.tar.gz /pathto/destination/folder/ab…
This article will explain how to establish a SSH connection to Ubuntu through the firewall and using a different port other then 22. I have set up a Ubuntu virtual machine in Virtualbox and I am running a Windows 7 workstation. From the Ubuntu vi…
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
Connecting to an Amazon Linux EC2 Instance from Windows Using PuTTY.

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now