2015-03-25 2 views
0

Я использую proftpd на Debian 7. Мне нужно заключить в тюрьму каждого пользователя в своем домашнем каталоге, чтобы они не могли видеть и получать доступ к родительским папкам. Фактически каждый пользователь регистрируется в своем собственном доме, но они могут видеть и получать доступ к родительским папкам. Как вы можете видеть ниже, я уже пробовал DefaultRoot ~ developers, а также DefaultRoot ~.Тюремный пользователь к их дому не работает

Как я могу заключить в тюрьму каждого пользователя в своем домашнем каталоге, чтобы они не могли видеть и получать доступ к родительским папкам?

Это мой proftpd.conf

# 
# /etc/proftpd/proftpd.conf -- This is a basic ProFTPD configuration file. 
# To really apply changes, reload proftpd after modifications, if 
# it runs in daemon mode. It is not required in inetd/xinetd mode. 
# 

# Includes DSO modules 
Include /etc/proftpd/modules.conf 

# Set off to disable IPv6 support which is annoying on IPv4 only boxes. 
UseIPv6    on 
# If set on you can experience a longer connection delay in many cases. 
IdentLookups   off 

ServerName   "Debian" 
ServerType   standalone 
DeferWelcome   off 

MultilineRFC2228  on 
DefaultServer   on 
ShowSymlinks   on 

TimeoutNoTransfer  600 
TimeoutStalled   600 
TimeoutIdle   1200 

DisplayLogin     welcome.msg 
DisplayChdir    .message true 
ListOptions     "-l" 

DenyFilter   \*.*/ 

# Use this to jail all users in their homes 

DefaultRoot ~ developers 
#DocumentRoot ~ 

# Users require a valid shell listed in /etc/shells to login. 
# Use this directive to release that constrain. 
# RequireValidShell  off 

# Port 21 is the standard FTP port. 
Port    21 

# In some cases you have to specify passive ports range to by-pass 
# firewall limitations. Ephemeral ports can be used for that, but 
# feel free to use a more narrow range. 
# PassivePorts     49152 65534 

# If your host was NATted, this option is useful in order to 
# allow passive tranfers to work. You have to use your public 
# address and opening the passive ports used on your firewall as well. 
# MasqueradeAddress  1.2.3.4 

# This is useful for masquerading address with dynamic IPs: 
# refresh any configured MasqueradeAddress directives every 8 hours 
<IfModule mod_dynmasq.c> 
# DynMasqRefresh 28800 
</IfModule> 

# To prevent DoS attacks, set the maximum number of child processes 
# to 30. If you need to allow more than 30 concurrent connections 
# at once, simply increase this value. Note that this ONLY works 
# in standalone mode, in inetd mode you should use an inetd server 
# that allows you to limit maximum number of processes per service 
# (such as xinetd) 
MaxInstances   30 

# Set the user and group that the server normally runs at. 
User    proftpd 
Group    nogroup 

# Umask 022 is a good standard umask to prevent new files and dirs 
# (second parm) from being group and world writable. 
Umask    022 022 
# Normally, we want files to be overwriteable. 
AllowOverwrite   on 

# Uncomment this if you are using NIS or LDAP via NSS to retrieve passwords: 
# PersistentPasswd  off 

# This is required to use both PAM-based authentication and local passwords 
# AuthOrder   mod_auth_pam.c* mod_auth_unix.c 

# Be warned: use of this directive impacts CPU average load! 
# Uncomment this if you like to see progress and transfer rate with ftpwho 
# in downloads. That is not needed for uploads rates. 
# 
# UseSendFile   off 

TransferLog /var/log/proftpd/xferlog 
SystemLog /var/log/proftpd/proftpd.log 

# Logging onto /var/log/lastlog is enabled but set to off by default 
#UseLastlog on 

# In order to keep log file dates consistent after chroot, use timezone info 
# from /etc/localtime. If this is not set, and proftpd is configured to 
# chroot (e.g. DefaultRoot or <Anonymous>), it will use the non-daylight 
# savings timezone regardless of whether DST is in effect. 
#SetEnv TZ :/etc/localtime 

<IfModule mod_quotatab.c> 
QuotaEngine off 
</IfModule> 

<IfModule mod_ratio.c> 
Ratios off 
</IfModule> 


# Delay engine reduces impact of the so-called Timing Attack described in 
# http://www.securityfocus.com/bid/11430/discuss 
# It is on by default. 
<IfModule mod_delay.c> 
DelayEngine on 
</IfModule> 

<IfModule mod_ctrls.c> 
ControlsEngine  off 
ControlsMaxClients 2 
ControlsLog   /var/log/proftpd/controls.log 
ControlsInterval  5 
ControlsSocket  /var/run/proftpd/proftpd.sock 
</IfModule> 

<IfModule mod_ctrls_admin.c> 
AdminControlsEngine off 
</IfModule> 

# 
# Alternative authentication frameworks 
# 
#Include /etc/proftpd/ldap.conf 
#Include /etc/proftpd/sql.conf 

# 
# This is used for FTPS connections 
# 
#Include /etc/proftpd/tls.conf 

# 
# Useful to keep VirtualHost/VirtualRoot directives separated 
# 
#Include /etc/proftpd/virtuals.conf 

# A basic anonymous configuration, no upload directories. 

# <Anonymous ~ftp> 
# User    ftp 
# Group    nogroup 
# # We want clients to be able to login with "anonymous" as well as "ftp" 
# UserAlias   anonymous ftp 
# # Cosmetic changes, all files belongs to ftp user 
# DirFakeUser on ftp 
# DirFakeGroup on ftp 
# 
# RequireValidShell  off 
# 
# # Limit the maximum number of anonymous logins 
# MaxClients   10 
# 
# # We want 'welcome.msg' displayed at login, and '.message' displayed 
# # in each newly chdired directory. 
# DisplayLogin   welcome.msg 
# DisplayChdir  .message 
# 
# # Limit WRITE everywhere in the anonymous chroot 
# <Directory *> 
#  <Limit WRITE> 
#  DenyAll 
#  </Limit> 
# </Directory> 
# 
# # Uncomment this if you're brave. 
# # <Directory incoming> 
# # # Umask 022 is a good standard umask to prevent new files and dirs 
# # # (second parm) from being group and world writable. 
# # Umask    022 022 
# #   <Limit READ WRITE> 
# #   DenyAll 
# #   </Limit> 
# #   <Limit STOR> 
# #   AllowAll 
# #   </Limit> 
# # </Directory> 
# 
# </Anonymous> 

# Include other custom configuration files 
Include /etc/proftpd/conf.d/ 
<Global> 
AccessGrantMsg "Benvenuto sul server demo Up3Up! Ricordati di fare sempre un backup di cio' che modifichi!" 
AccessDenyMsg "Accessi al server FTP demo di Up3Up errati!" 
</Global> 

Это, как я создавать пользователей и установить свой собственный домашнюю папку

#!/bin/bash 

echo "Procedura per la creazione di un utente FTP . . ." 

#Chiedo il nome dell'account 
read -p "Inserisci il nome (senza @up3up.net): " user 

#Chiedo il percorso 
echo "Percorso per $user @ up3up.net (senza /var/www/up3upn/public_html/)" 
read -p "Inserisci il percorso: " percorso 

#Se non esiste il percorso lo creo 
mkdir /var/www/up3upn/public_html/"$percorso" &> /dev/null 

#Avverto che verra' chiesta la password 
echo "Inserisci la password in chiaro per $user @ up3up.net" 

#Creo l'account' e chiedo la password 
useradd -d /var/www/up3upn/public_html/"$percorso" "$user" &> /dev/null 
usermod -m -d /var/www/up3upn/public_html/"$percorso" "$user" &> /dev/null 
useradd -G developers "$user" &> /dev/null 
passwd "$user" 

echo "Account creato $user @ up3up.net con percorso /var/www/up3upn/public_html/$percorso" 

#Riavvio il servizio FTP 
service proftpd restart &> /dev/null 

ответ

0

У меня была такая же проблема .. я узнал, что потребности DefaultRoot ~ developers линии чтобы быть в конце конфигурационного файла.

2

вам необходимо создать группу (например, ftpjail) ald, добавить всех пользователей, которые должны быть заключены в тюрьму в эту группу.

Затем добавьте строку в proftpd.conf (не должно быть в конце файла):

DefaultRoot ~ ftpjail # this must be a group! 

Теперь перезапустите FTP-сервер и теперь пользователи и заключены в тюрьму в изолированной среде!

Смежные вопросы