05-23-2008
deny ftp access to users by placing their id into the /etc/ftpd/ftpusers file. Btw, you can check the FTP services enabled in the /etc/inet/services file
10 More Discussions You Might Find Interesting
1. HP-UX
Hi,
Please any one can help me to know that how we can restrict a user group to access the kernel at all. (0 Replies)
Discussion started by: harishankar
0 Replies
2. Red Hat
Hi all,
I am using RHEL 5.0
I need a user say test to have full access to two directories, say /tmp1 & /tmp2 only other than his home directory.
I do not want to change his login shell which is ksh or bash by default.
Moreover, he should not even have read access of other directories.
... (10 Replies)
Discussion started by: vikas027
10 Replies
3. UNIX for Dummies Questions & Answers
Hi!
i'm using FreeBSD 6.2 and hosting my pc to frens
in particular of sensitive information being saved to the PC, i would like to know is it possible for me to restrict user access to their /home dir. only?
and also, i wanted to restrict them listing files under /etc
thanks all! (10 Replies)
Discussion started by: rdns
10 Replies
4. UNIX for Advanced & Expert Users
Hi all,
How can i give ftp access to single user on solaris9 system? others should not have the ftp access. i know about ftpusers file in /etc/ftpd but still what about if so many new users are created daily?
And now for that single user how can we restict him to ftp the files only from... (2 Replies)
Discussion started by: santhoshkumar_d
2 Replies
5. UNIX for Dummies Questions & Answers
specifically - I don't need to restrict a user to a single directory - but I want them to be "ROOTED" to their home directory.
so if my home directory is /home/onlyme
when I login - if I do a pwd - I want to see:
/
but in real life I will be in /home/onlyme - it just appears as root to... (10 Replies)
Discussion started by: itobenon
10 Replies
6. Red Hat
Hi,
I had installed vsftp in rhel5 and i want to restrict all the local users from accessing the ftp.
i want to allow specific users to access the ftp server.
Request you to please help.
Thanks & regards
Arun (1 Reply)
Discussion started by: Arun.Kakarla
1 Replies
7. Solaris
I am using Solaris 10 on SPARC.
SunOS ddw 5.10 Generic_139555-08 sun4u sparc SUNW,SPARC-Enterprise
I have put some text files in a directory '/u01/network'
I want to create a ftp user which can just read the files in the network directory. The ftp user shouldn't be able to navigate or see... (4 Replies)
Discussion started by: fahdmirza
4 Replies
8. UNIX for Dummies Questions & Answers
Hi All,
How can we restrict a particular user access to a particular shell in solaris 10.
Thanks in Advance. (5 Replies)
Discussion started by: rama krishna
5 Replies
9. Red Hat
Hi there
I have an application user on my system that wants accesses to these file systems as such:
rwx:
/SAPO
/SAPS12
/R3_888
/R3_888B
/R3_888F
/R3_888R
r:
/usr/sap
these are the existing FS permissions:ownerships:
# ls -ld /SAPO (9 Replies)
Discussion started by: hedkandi
9 Replies
10. Solaris
Hi,
I have searched "Limit FTP user's access to a specific directory" subject for 3 days. I found proftp and vsftp but i couldn't compile and install. Is there any idea. Please suggest. (6 Replies)
Discussion started by: hamurd
6 Replies
FTPUSERS(5) BSD File Formats Manual FTPUSERS(5)
NAME
ftpusers, ftpchroot -- tnftpd(8) access control file
DESCRIPTION
The ftpusers file provides user access control for tnftpd(8) by defining which users may login.
If the ftpusers file does not exist, all users are denied access.
A ``'' is the escape character; it can be used to escape the meaning of the comment character, or if it is the last character on a line,
extends a configuration directive across multiple lines. A ``#'' is the comment character, and all characters from it to the end of line are
ignored (unless it is escaped with the escape character).
The syntax of each line is:
userglob[:groupglob][@host] [directive [class]]
These elements are:
userglob matched against the user name, using fnmatch(3) glob matching (e.g, 'f*').
groupglob matched against all the groups that the user is a member of, using fnmatch(3) glob matching (e.g, '*src').
host either a CIDR address (refer to inet_net_pton(3)) to match against the remote address (e.g, '1.2.3.4/24'), or an fnmatch(3)
glob to match against the remote hostname (e.g, '*.NetBSD.org').
directive If ``allow'' or ``yes'' the user is allowed access. If ``deny'' or ``no'', or directive is not given, the user is denied
access.
class defines the class to use in ftpd.conf(5).
If class is not given, it defaults to one of the following:
chroot If there is a match in /private/etc/ftpchroot for the user.
guest If the user name is ``anonymous'' or 'ftp'.
real If neither of the above is true.
No further comparisons are attempted after the first successful match. If no match is found, the user is granted access. This syntax is
backward-compatible with the old syntax.
If a user requests a guest login, the tnftpd(8) server checks to see that both ``anonymous'' and ``ftp'' have access, so if you deny all
users by default, you will need to add both ``anonymous allow'' and ``ftp allow'' to /private/etc/ftpusers in order to allow guest logins.
/private/etc/ftpchroot
The file /private/etc/ftpchroot is used to determine which users will have their session's root directory changed (using chroot(2)), either
to the directory specified in the ftpd.conf(5) chroot directive (if set), or to the home directory of the user. If the file does not exist,
the root directory change is not performed.
The syntax is similar to ftpusers, except that the class argument is ignored. If there's a positive match, the session's root directory is
changed. No further comparisons are attempted after the first successful match. This syntax is backward-compatible with the old syntax.
FILES
/private/etc/ftpchroot List of normal users who should have their ftp session's root directory changed by using chroot(2).
/private/etc/ftpusers This file.
/usr/share/ftpd/examples/ftpusers A sample ftpusers file.
SEE ALSO
fnmatch(3), inet_net_pton(3), ftpd.conf(5), tnftpd(8)
BSD
February 28, 2003 BSD