Sponsored Content
Top Forums UNIX for Dummies Questions & Answers Default umask setting during ftp AIX Post 302910960 by rbatte1 on Tuesday 29th of July 2014 09:26:35 AM
Old 07-29-2014
This may be considered illegal and ignored (assuming that your FTP process doesn't set the permissions itself)

You should really try ftp -u 002 to be clear.

Setting the umask value for ftpd will also not set the file executable. I think it is always considered as a transfer for data. If you need this, then consider something like:-
Code:
ftp -nv $target <<-EOFTP
   user $user $password
   cd /target/dir
   put sourcefile targetfile
   site chmod 750 targetfile
   quit
EOFTP

It would be a little odd (but not illegal) to have a .txt file set as executable.


I hope that this helps,
Robin
 

9 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

setting umask in FreeBSD 5.4

Hi, I need to change my umask from 22 to 0022. FreeBSD 5.4 has different way of looking at 22 and 0022. Untill 4.11 stable 022 and 0022 were same. Can anyone help me? Thanks in advance. Jimmy (0 Replies)
Discussion started by: jimmynath
0 Replies

2. AIX

umask setting on a logon script

hi, am new to AIX. i have an issue. iam asked to change the umask setting on a logon script on a server to prevent writable files. i logged in as the root user and typed in umask and it displays 022, which i believe is 755 for direc and 644 for files. 1) how to I identify where the logon script... (2 Replies)
Discussion started by: karthikosu
2 Replies

3. Linux

setting daemon umask

I was asked to change the daemon umask on my RHEL4 machine. so, i changed the /etc/init.d/functions file. Does this take effect right away? I dont think it does, how can i get it to take affect without rebooting? (1 Reply)
Discussion started by: BG_JrAdmin
1 Replies

4. Shell Programming and Scripting

umask setting

dear all, i'm trying to set the default permission using umask commnd. i'm using bash shell and the permission of the .bash_profile file is -rwxr-x--- 1 tdmscrdr dba 370 Nov 7 12:21 .bash_profile but still i'm not able to change the default permissiom. in the .bash_profile... (1 Reply)
Discussion started by: panknil
1 Replies

5. HP-UX

umask for an ftp account

Hi, I have an ftp account which is used for transferring files to a UNIX box. eventhough the permissions on the source box for the files are 777, when it reaches the destination node via this ftp transfer the permissions is getting changed to -rw-r----- can someone please help me? umask... (3 Replies)
Discussion started by: vivek_damodaran
3 Replies

6. UNIX for Dummies Questions & Answers

UMASK setting

How can we set the Sticky bit in the umask itself. Please help me :confused: I tried to set like umask 1000 but when I run umask, the value of umask is 00 (0 Replies)
Discussion started by: geniman2004
0 Replies

7. AIX

default umask setting during ftp

Hi all, How do i change the default primary group of files uploaded in AIX (via ftp) in such a way that the files will be owned by tom:staff? I understand that the default file permission can be set in /etc/profile for aix by adding a new line umask=032 Do I add a line in umask as well?... (5 Replies)
Discussion started by: chipahoys
5 Replies

8. UNIX for Dummies Questions & Answers

Setting umask 022 by default to my profile

Hello everyone, I want to set my properties of my profile to umask 022 by default. I have an idea that i need to make the change in .profile file. Can you please help me, on how would i be able to set it. Thanks, Abhishek S. (4 Replies)
Discussion started by: abhisheksunkari
4 Replies

9. Shell Programming and Scripting

Setting default permissions without umask or cron jobs

I've got a number of people sending files to me in different directory structures, and users on many different groups who need access to these incoming paths. My problem is that umask assumes a default of 666 for files. No execute bit, meaning that my users can't even see the incoming folders.... (2 Replies)
Discussion started by: Karunamon
2 Replies
ftp-proxy(8)							    Proxy-Suite 						      ftp-proxy(8)

NAME
ftp-proxy - application level proxy for the FTP protocol SYNOPSIS
ftp-proxy [-c] [-d|-i] [-f file] [-n] [-v level] [-V] DESCRIPTION
FTP-Proxy acts as an application level gateway between FTP clients and servers. Its main purpose is to secure local FTP servers against possibly insecure clients or malicious attacks. FTP-Proxy is believed to be immune against current known attacks based on the FTP proto- col. FTP-Proxy can be started from the inetd (or xinetd, or any other) internet super daemon or executed on its own as a standalone daemon, in which case it will fork child processes to handle connections. The behaviour depends on the ftp-proxy.conf(5) configuration option Server- Type or the -i and -d command line switches, where the latter two take precedence. FTP-Proxy features a rich set of auditing and command restriction capabilities and is specifically suited for deployment in firewall envi- ronments. OPTIONS
-V Print the program's version information and terminate with exit code 0. -c Read the configuration file, output its contents sorted by section and option name to standard output, and terminate with exit code 0. This option is mostly interesting for diagnostic purposes. -d Force FTP-Proxy to run in standalone (daemon) mode, even if a ServerType inetd directive exists in the configuration file. -i Force FTP-Proxy to run in inetd mode, even if a ServerType standalone directive exists in the configuration file. -f filename Specify an alternate configuration file to be read instead of the standard /etc/proxy-suite/ftp-proxy.conf file. Please note that the default path for the configuration file is a compile time option. It can be changed using the --prefix and --sysconfdir options when running the configure script - see also the INSTALL file for usage description. -n Do not detach from the controlling terminal. This prevents the default of becoming a daemon and is ignored if running in inetd mode. The main purpose of this option is to support the AIX System Resource Controller or similar setups, where several daemons are controlled by a master daemon. -v level Enable diagnostic output to be sent to the file /tmp/ftp-proxy.debug. The given level must be in the range from 0 (no output at all) to 4 (maximum verbosity). See also DIAGNOSTICS bellow. SIGNALS
SIGTERM, SIGQUIT, SIGINT These signals instruct FTP-Proxy to abort any existing transfer, close all connections and terminate the process. If the target of the signal is a running FTP-Proxy daemon, all current child processes wil also be terminated. SIGHUP This signal will be accepted if running in daemon mode and ignored in inetd mode. It causes the FTP-Proxy to reread its configuration file and to reopen the log destination if it was changed in the configuration file, or rotated if it is a log file. See also dedicated rotation singnal SIGUSR1 bellow. SIGUSR1 This signal will be accepted if running in daemon mode and ignored in inetd mode. It causes the FTP-Proxy to close its current logfile, rename it to a date and time derived value, and open a new logfile. This pro- cedure is also known as Logfile Rotation. Child processes forked before the reception of this signal and processes run from inetd will not be affected. See also the ServerRoot configuration option in ftp-proxy.conf(5). NOTES
When running FTP-Proxy in inetd mode, it is always an excellent idea to check that the inetd configuration file includes a line that invokes FTP-Proxy. An example for a line in /etc/inetd.conf follows: ftp stream tcp nowait root /usr/sbin/ftp-proxy -i Please note that this is just an example and does not provide much security, like running as a non-privileged user or using the TCP Wrapper functionality. DIAGNOSTICS
The -v option is is only available if enabled using the --enable-debug option when running the configure script - see also the INSTALL file for usage description. This option should be used with great care only. It is strongly recommended to not to use it in production environ- ments. If debugging is activated, it always adds output to the file /tmp/ftp-proxy.debug which is created with 0666 mode. This allows child pro- cesses to open and write the file after they have given up their root privileges. If the configuration file contains a ServerRoot directive, child processes and processes run from inetd will try to open the file within their chroot(2) environment. If this fails, e.g. because there is no /tmp directory, it is silently ignored and no debug output is gener- ated. Please note that the program makes no attempt to erase the debug file after use. Thus it will stay around with world writeability until the operator manually removes it! FILES
/etc/proxy-suite/ftp-proxy.conf /usr/sbin/ftp-proxy SEE ALSO
ftp-proxy.conf(5) The SuSE Proxy-Suite documentation included in the doc subdirectory of the package. AUTHORS
Jens-Gero Boehm <jens-gero.boehm@suse.de> Pieter Hollants <pieter.hollants@suse.de> Volker Wiegand <volker.wiegand@suse.de> Marius Tomaschewski <mt@suse.de> COPYRIGHT
The whole SuSE Proxy-Suite is released under the GNU General Public License (GPL). SuSE September 20th, 1999 ftp-proxy(8)
All times are GMT -4. The time now is 10:18 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy