Starting with 3.10.0, FileZilla uses FTP over TLS by default:
https://forum.filezilla-project.org/viewtopic.php?f=2&t=34860
https://forum.filezilla-project.org/viewtopic.php?f=2&t=34860
That is right. There are a few clients complaining they can not use FTP.
Will this be enabled/updated in CustomBuild soon?
-----BEGIN RSA PRIVATE KEY-----
(Your Private Key: your_domain_name.key)
-----END RSA PRIVATE KEY-----
-----BEGIN CERTIFICATE-----
(Your Primary SSL certificate: your_domain_name.crt)
-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----
(Your Intermediate certificate: from_cert_provider.crt)
-----END CERTIFICATE-----
-----BEGIN CERTIFICATE-----
(Your Root certificate: from_cert_provider.crt)
-----END CERTIFICATE-----
By default FileZilla now uses explicit FTP over TLS if it is available, so it should still work even if you don't support explicit.
I don't know about ProFTPD but Pure-FTPD supports it when installed using CB2, just place your key, certificate and chain in /etc/pure-ftpd.pem in the following format
Filezilla will throw a not-so-nice welcome message that the Server's Certificate is unknown.Basically, we can either -
- disable ProFTPd TLS, or
- open passive ports in iptables (ip_conntrack_ftp cannot see the TLS-encrypted traffic)
What kind of Crtificate are you using? If commercial, have you installed the Vendor's CA Root Certificate(s)?Filezilla will throw a not-so-nice welcome message that the Server's Certificate is unknown.
Instructins in the CSF read-me say to open passive ports 30000:35000 in pure-ftpd.conf as well as in CSF firewall. But our CustomBuild 2 servers don't have a copy of pure-ftpd.conf.By default FileZilla now uses explicit FTP over TLS if it is available, so it should still work even if you don't support explicit.
I don't know about ProFTPD but Pure-FTPD supports it when installed using CB2, just place your key, certificate and chain in /etc/pure-ftpd.pem in the following format
OPTIONS="-B -A -C 4 -E -H -k 95 -L 10000:8 -O stats:${LOG} -l puredb:${DB} [B]-p 35000:35999[/B] -u 100 -U 133:022 -w -Z"
$IPTABLES -A INPUT -p tcp --dport 35000:35999 -j ACCEPT
$IPTABLES -A INPUT -p tcp --dport 20 -j ACCEPT
Admin Level -> ConfigServer Firewall&Security -> Firewall Configuration:
IPv4 Settings -> TCP_IN: Add:
,35000:35999
IPv6 Port Settings -> TCP6_IN: Add:
,35000:35999
iptables -nL | grep dpts
ACCEPT tcp -- 0.0.0.0/0 0.0.0.0/0 state NEW tcp dpts:35000:35999