Next Previous Contents

2. Basic configuration

The FTP protocol is fairly old (more than 20 years) and many features were added. The wuftpd server supports quite a few of those. Today, there are many other file sharing protocol out there (HTTP + dynamic content) often offering more control and ease of use for clients.

In general, ftp is used for basic file sharing. We will describe here the basic settings supported by this module. You may want to consult the man page ftpaccess to learn more.

2.1 Misc

Email of admin

You enter the email address of the administrator responsible for this server. This information is printed as part of the banner file. You must write one and include the magic sequence %E. The sequence will be replaced by the value entered in this field.

Guest groups

You enter a list of user groups considered guest. wuftpd has three independant settings for normal, guest and anonymous users. You may enter zero of more groups here separated by spaces.

Banner file

This is the path of a text file (ASCII) presented everytime a user log in. You can edit the file using the edit banner button.

Shutdown message

This specifies the path of a control file. If the file exists, the server will check the file regularly to see if the server is going to be shut down. If a shutdown is planned, the user is notified, new connections are denied after a specified time before shutdown and current connec­ tions are dropped at a specified time before shut­ down.

The file is structured as follows:

        <year> <month> <day> <hour> <minute> <deny_offset> <disc_offset> <text>
        

where

The external program ftpshut(8) can be used to auto­ mate the process of generating this file.

Allow anonymous access

You can enable or disabled anonymous access using this check-box. If you enable anonymous access, make sure the anonftp package is installed.

2.2 Control

For the various access mode (user,guest,anonymous), you can limit the features available. Note that the ftp server generally execute with the same privilege as the user connected, so even if this user has a given privilege, the operating system may still limit his ability to perform the operation. Said differently, the FTP server may allow the user to try or not an operation, but the operating system as the final say about the result.

May request compressed file

A user may request a file with the extension .Z or .gz. If this file does not exist, but the corresponding file without the extension do exist, the server will compress it on the fly.

May request tar files

If a tar file (with extension .tar) is request, but only a corresponding directory exist, a TAR is produced on the fly. This allows the users to grab complete directories in a single command.

May chmod files

The user is allowed to change the permissions of a file.

May delete files

The user is allowed to delete files.

May overwrite files

The user is allowed to overwrite existing files.

May rename files

The user is allowed to rename existing files.

Log inbound transfers

For every file received, an entry is written in the transfer log. You can disable this behavior.

Log outbound transfers

For every file transmitted, an entry is written in the transfer log. You can disable this behavior.

2.3 Timeouts

You control various timeout for the various operations done during a session.

Accept connection (default 120 seconds)

How long the daemon will wait for an incoming (PASV) data connection.

PORT connection (default 120 seconds)

How long the daemon will wait attempting to establish an outgoing (PORT) data connection. This effects the actual connetion attempt. The daemon makes several attempts, sleeping a while between each, before completely giving up.

Data transfer (default 1200 seconds)

How long the daemon will wait for some activity on the data connection. You should keep this long because the remote client may have a slow link and there can be quite a bit of data queued for the client.

Default idle time (default 900 seconds)

How long the daemon will wait for the next command. The default can also be overridden by the command line -a option. This access clause overrides both.

Maximum idle time (default 1200 seconds)

The SITE IDLE command allows the remote client to establish a higher value for the idle timeout. This sets the upper limit the client may request. The default can also be overrid­ den by the command line -A option. This access clause overrides both.

Auth/Ident (default 10 seconds)

The maximum time the daemon allows for the entire RFC931 (AUTH/ident) con­ versation. Setting this to zero (0) completely dis­ ables the daemon's use of this protocol. The infor­ mation obtained via RFC931 is recorded in the system logs and not actually used in any authentication.


Next Previous Contents