|Stable release||3.0.2 / September 18, 2012|
|Operating system||Unix-like systems|
vsftpd supports explicit (since 2.0.0) and implicit (since 2.1.0) FTPS.
Compared to other ftp server software vsftpd is built to be especially efficient and very secure.
In July 2011, it was discovered that vsftpd version 2.3.4 downloadable from the master site had been compromised. Users logging into a compromised vsftpd-2.3.4 server may issue a ":)" smileyface as the username and gain a command shell on port 6200. This was not an issue of a security hole in vsftpd, instead, someone[clarification needed] had uploaded a different version of vsftpd which contained a backdoor. Since then, the site was moved to Google App Engine.
How to install
In order to install vsftpd in Debian-based Linux distributions, use the following command:-
sudo apt-get install vsftpd
once you installed vsftpd, you will need to change configurations in order to allow to read/write operations for the users. To change the configurations, open file called vsftpd.conf present under /etc/vsftpd.conf. Uncomment the below mentioned parameters to enable users to login and upload files-
- local_enable=YES should be uncommented.
- write_enable=YES should be uncommented.
Once you are done with these configuration changes , you will need to restart the vsftpd service. To restart , use below mentioned command:-
sudo service vsftpd restart
That's it....you are done with the FTP setup on your Server.
- "README file from source code".[dead link]
- vsftpd Compromised Source Packages Backdoor Vulnerability at SecurityFocus
- Evans, Chris (2011-06-03). "Alert: vsftpd download backdoored". Retrieved July 7, 2011.
- Official website
- List of Config Directives
- vsftpd at Freecode
- vsftpd Forum a vsftpd support Forum
- Guide to setting up vsftpd including TLS/SSL encryption
|This network-related software article is a stub. You can help Wikipedia by expanding it.|