To chroot ftp user outside of plesk, add the user belonging to psacln group.
usemod -g psacln <username>
chrootchroot ftp user outside pleskSubmitted by sandip on Fri, 06/03/2011 - 15:49To chroot ftp user outside of plesk, add the user belonging to psacln group. usemod -g psacln <username> »
Setup secure ProFTPdSubmitted by sandip on Fri, 06/12/2009 - 14:42Ftp can be secured using ftps to connect. Below outlines a configuration to support such a setup using TLS/SSL. I usually use the epel repository to install proftpd: yum --enablerepo=epel install proftpd Configure for tls/ssl connection: chroot and bindsocket to listen to single IP: Setup passive ftp ports: </Global> Create the certs: mkdir -p /etc/pki/tls/proftpd Create /etc/pam.d/ftp so PAM can authenticate for proftpd: #%PAM-1.0 Add "/bin/false" to "/etc/shells" file and use it as the shell type when creating new users: useradd -s /bin/false <ftp_user> »
SSH Chroot in ISPConfig Centos-4.6Submitted by sandip on Thu, 02/28/2008 - 00:58Below is reference of how I have setup chroot SSH jail for users in CentOS-4.6 with ISPConfig installed replacing the openssh rpm with the one from chrootssh.sourceforge.net . It's easy on ISPConfig as support for chroot SSH is now built in with the control panel, you simply need to get chrootSSH installed and then enable the ssh option located in the config file at "/home/admispconfig/ispconfig/lib/config.inc.php": $go_info["server"]["ssh_chroot"] = 1; If you need for the ssh chroot to access additional application, the file "/root/ispconfig/scripts/shell/create_chroot_env.sh" which builds the chroot needs to be edited. Also, check and edit the location of mysql socket file. |
User loginRecent blog posts
Who's onlineThere are currently 0 users and 3 guests online.
|