From e1e1e1ee2908e5c255ad048e59064658528fbd6e Mon Sep 17 00:00:00 2001 From: paspo Date: Wed, 14 Feb 2024 17:24:54 +0100 Subject: [PATCH] updated default proftpd config --- rootfs/etc/proftpd/proftpd.conf | 56 +++++++++++++++++++++++++++++++++ 1 file changed, 56 insertions(+) create mode 100644 rootfs/etc/proftpd/proftpd.conf diff --git a/rootfs/etc/proftpd/proftpd.conf b/rootfs/etc/proftpd/proftpd.conf new file mode 100644 index 0000000..9d09573 --- /dev/null +++ b/rootfs/etc/proftpd/proftpd.conf @@ -0,0 +1,56 @@ +# This is the directory where DSO modules reside +ModulePath /usr/lib/proftpd + +# Allow only user root to load and unload modules, but allow everyone +# to see which modules have been loaded +ModuleControlsACLs insmod,rmmod allow user root +ModuleControlsACLs lsmod allow user * + +Include /etc/proftpd/modules.d/ + +ServerName "ProFTPD Default Installation" +ServerType standalone + +# Port 21 is the standard FTP port. +Port 21 + +# Don't use IPv6 support by default. +UseIPv6 off + +# Umask 022 is a good standard umask to prevent new dirs and files +# from being group and world writable. +Umask 022 + +# To prevent DoS attacks, set the maximum number of child processes +# to 30. If you need to allow more than 30 concurrent connections +# at once, simply increase this value. Note that this ONLY works +# in standalone mode, in inetd mode you should use an inetd server +# that allows you to limit maximum number of processes per service +# (such as xinetd). +MaxInstances 30 + +# Set the user and group under which the server will run. +User proftpd +Group proftpd + +# To cause every FTP user to be "jailed" (chrooted) into their home +# directory, uncomment this line. +#DefaultRoot ~ + +# Normally, we want files to be overwriteable. +AllowOverwrite on + +DefaultServer on +ShowSymlinks on + +TimeoutNoTransfer 600 +TimeoutStalled 600 +TimeoutIdle 1200 + +DisplayLogin welcome.msg +DisplayChdir .message true +ListOptions "-l" + +DenyFilter \*.*/ + +Include /etc/proftpd/conf.d/