$ sudo chown programmer_1:programmer_1 /home/programmer_1/ftp_files/uploads Step 5: FTP server configurationīefore configuring the vsftpd configuration file located in /etc/vsftpd, take a backup of the file. Now we will create sub directory where FTP user will upload the files with ownership assign $ sudo mkdir /home/programmer_1/ftp_files/uploads a-w means – all/everyone remove write permissions.$ sudo chown nobody:nogroup /home/programmer_1/ftp_filesĪdded some more permission $ sudo chmod a-w /home/programmer_1/ftp_files Now, set ownership of the newly created directory of the FTP user. $ sudo mkdir /home/programmer_1/ftp_files I will create a home directory for the FTP user. It completely depends upon the user rules, let’s give users only home directory access, what users will upload, update or download files there. Save the file and restart SSH service by following command $ sudo service sshd restart Step 4: Access Rights $ sudo vi /etc/ssh/sshd_configĪdd the following line to the file DenyUsers programmer_1 $ sudo adduser programmer_1Īs we will share only FTP access to the user (programmer_1), we have to modify SSH configuration file to prevent SSH access from the FTP user. Let’s create a user with user name programmer_1. Now you have to create user with proper access rights. It should be active now, and shows similar to the below. Now run following commands $ sudo ufw allow 20:21/tcpĪfter firewall enable, check status again $ sudo ufw status In the security groups inbound rules, you have to add following rules.Īfter adding this port to security group, now you have to check firewall status by following command $ sudo ufw status $ sudo service vsftpd status Step 2 : Firewall Configuration
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |