tillo
Verified User
Nope
but I'll probably test it out some time this year, if I finally happen to have some free time 


CentOS 5.3, 32-bit.Hi Mopquill,
What OS did you configure it in, and is your OS 32 bit or 64 bit?
Thanks,
Jason
Linux sub.example.com [omitted] Fri Aug 21 03:42:35 MSD 2009 i686 i686 i386 GNU/Linux
cp /usr/local/directadmin/custombuild/configure/proftpd/configure.proftpd /usr/local/directadmin/custombuild/custom/proftpd/configure.proftpd
cd /usr/local/directadmin/custombuild/
./build clean
./build update
./build proftd
As it turns out, I also start getting my password denied after around 24-48 hours, and I have to restart proftpd.
On top of this, my users are repeatedly being suspended for bandwidth over-usage
I was researching how to mod_sftp in DA and I discovered it is now included with proftpd source code
I was researching how to mod_sftp in DA and I discovered it is now included with proftpd source code (see here: http://www.castaglia.org/proftpd/#Modules).
So, if you're using custombuild, Step 2 should be changed to something like:
Code:cp /usr/local/directadmin/custombuild/configure/proftpd/configure.proftpd /usr/local/directadmin/custombuild/custom/proftpd/configure.proftpd
Edit /usr/local/directadmin/custombuild/custom/proftpd/configure.proftpd and change mod_tls to mod_sftp.
Code:cd /usr/local/directadmin/custombuild/ ./build clean ./build update ./build proftd
Also, has enyone else experienced the same problems Mopquill has with mod_sftp?
_
Example Configuration
When using mod_sftp to handle SFTP connections, you will want to create a separate <VirtualHost> section for the mod_sftp configuration. SSH2 (and thus SFTP) requires a different port than FTP; in order to listen on different ports, proftpd requires different <VirtualHost> sections. You can have multiple <VirtualHost> sections for the same address (IP address or DNS name), just different Port directives.
<IfModule mod_sftp.c>
<VirtualHost a.b.c.d>
SFTPEngine on
SFTPLog /etc/proftpd/sftp/sftp.log
# Configure the server to listen on the normal SSH2 port, port 22
Port 22
# Configure both the RSA and DSA host keys, using the same host key
# files that OpenSSH uses.
SFTPHostKey /etc/ssh_host_rsa_key
SFTPHostKey /etc/ssh_host_dsa_key
# Configure the file used for comparing authorized public keys of users.
SFTPAuthorizedUserKeys file:~/.sftp/authorized_keys
# Enable compression
SFTPCompression delayed
# Allow the same number of authentication attempts as OpenSSH.
#
# It is recommended that you explicitly configure MaxLoginAttempts
# for your SSH2/SFTP instance to be higher than the normal
# MaxLoginAttempts value for FTP, as there are more ways to authenticate
# using SSH2.
MaxLoginAttempts 6
</VirtualHost>
</IfModule>
<IfModule mod_sftp.c>
SFTPEngine On
SFTPHostKey /etc/ssh/ssh_host_rsa_key
SFTPHostKey /etc/ssh/ssh_host_dsa_key
# Enable compression
SFTPCompression delayed
# Allow the same number of authentication attempts as OpenSSH.
#
# It is recommended that you explicitly configure MaxLoginAttempts
# for your SSH2/SFTP instance to be higher than the normal
# MaxLoginAttempts value for FTP, as there are more ways to authenticate
# using SSH2.
MaxLoginAttempts 6
</IfModule>
./configure \
--prefix=/usr/local \
--without-pam --disable-auth-pam \
--enable-openssl \
--with-modules=mod_ratio:mod_readme:mod_sftp:mod_tls
# common stuff goes here
Include /usr/local/etc/proftpd/proftpd.conf
<IfModule mod_tls.c>
TLSEngine on
PassivePorts 49152 65534 # in case ftpd is behind a firewall.
TLSLog /var/log/proftpd/tls.log
TLSProtocol SSLv3 TLSv1
TLSRequired ctrl
TLSRSACertificateFile /usr/local/etc/ssl/certs/proftpd.pem
TLSRSACertificateKeyFile /usr/local/etc/ssl/certs/proftpd.pem
TLSVerifyClient off
TLSRenegotiate none
</IfModule>
# common stuff
Include /usr/local/etc/proftpd/proftpd.conf
<IfModule mod_sftp.c>
SFTPEngine on
SFTPLog /var/log/proftpd/sftp.log
Port 2222
SFTPHostKey /etc/ssh/ssh_host_rsa_key
SFTPHostKey /etc/ssh/ssh_host_dsa_key
SFTPCompression delayed
MaxLoginAttempts 6
</IfModule>
# /usr/local/sbin/proftpd -c /usr/local/etc/proftpd/ftpes.conf
# /usr/local/sbin/proftpd -c /usr/local/etc/proftpd/sftp.conf
Commando: AUTH TLS
Antwoord: 500 AUTH not understood
Commando: AUTH SSL
Antwoord: 500 AUTH not understood
rootbsd said:1) It only encrypts the control channel of FTP, leaving the actual data transferred still in clear text.
This is completely wrong. You can encrpyt the control AND the data channel. You can encrypt listings as well. If your FTP client doesn't support it, then maybe it's time to switch client.tillo said:It is true that FTPS doesn't crypt the transfer channel, and that the ip_conntrack_ftp netfilter module for linux can't track the transfer channel port and eventually open it if closed...
This is quite a common problem, that is not directly related to FTPS. It's easy to add passive ports to ProFTPdrootbsd said:2) That also causes problems with FTP traversal of firewalls since the firewall can't see which ports are going to be needed, although that can be worked around with PassivePorts configuration in ProFTPD.
I actually find FTPS to be more common.rootbsd said:3) FTP/TLS support is also less common in FTP clients.
Is it the same as openssl / SSH - does it just hand everything over to SSH - meaning that users can get a shell, and basically you can't lock them down to their own vsite (they can list files outside their web root)?
What I would like to do is to give the user the SFTP details from his DA username/pw, for them to use these details to securely SFTP in with pretty much any secure file transfer client (without compatibility / firewall problems) - but for them to be locked down to their own website folders - and with no shell access - just like with plain old FTP.