Skip to content

Commit 62774d8

Browse files
authored
Merge pull request hestiacp#1089 from skullwritter/patch-1
Add Proftpd TLS configs
2 parents 90f5e24 + 5d6f3b6 commit 62774d8

File tree

2 files changed

+65
-0
lines changed

2 files changed

+65
-0
lines changed

install/deb/proftpd/proftpd.conf

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -4,6 +4,8 @@ ServerAdmin root@localhost
44
DefaultServer on
55
DefaultRoot ~ !adm
66

7+
Include /etc/proftpd/tls.conf
8+
79
<IfModule mod_vroot.c>
810
VRootEngine on
911
VRootAlias /etc/security/pam_env.conf etc/security/pam_env.conf

install/deb/proftpd/tls.conf

Lines changed: 63 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,63 @@
1+
#
2+
# Proftpd sample configuration for FTPS connections.
3+
#
4+
# Note that FTPS impose some limitations in NAT traversing.
5+
# See http://www.castaglia.org/proftpd/doc/contrib/ProFTPD-mini-HOWTO-TLS.html
6+
# for more information.
7+
#
8+
<IfModule mod_dso.c>
9+
# If mod_tls was built as a shared/DSO module, load it
10+
LoadModule mod_tls.c
11+
</IfModule>
12+
<IfModule mod_tls.c>
13+
TLSEngine on
14+
TLSLog /var/log/proftpd/tls.log
15+
# this is an example of protocols, proftp works witl all, but use only the most secure ones like TLSv1.1 and TLSv1.2
16+
TLSProtocol TLSv1.1 TLSv1.2
17+
#
18+
# Server SSL certificate. You can generate a self-signed certificate using
19+
# a command like:
20+
#
21+
# openssl req -x509 -newkey rsa:1024 \
22+
# -keyout /etc/ssl/private/proftpd.key -out /etc/ssl/certs/proftpd.crt \
23+
# -nodes -days 365
24+
#
25+
# The proftpd.key file must be readable by root only. The other file can be
26+
# readable by anyone.
27+
#
28+
# chmod 0600 /etc/ssl/private/proftpd.key
29+
# chmod 0640 /etc/ssl/private/proftpd.key
30+
#
31+
TLSRSACertificateFile /usr/local/hestia/ssl/certificate.crt
32+
TLSRSACertificateKeyFile /usr/local/hestia/ssl/certificate.key
33+
#
34+
# CA the server trusts...
35+
#TLSCACertificateFile /etc/ssl/certs/CA.pem
36+
# ...or avoid CA cert and be verbose
37+
#TLSOptions NoCertRequest EnableDiags
38+
# ... or the same with relaxed session use for some clients (e.g. FireFtp)
39+
#TLSOptions NoCertRequest EnableDiags NoSessionReuseRequired
40+
#
41+
#
42+
# Per default drop connection if client tries to start a renegotiate
43+
# This is a fix for CVE-2009-3555 but could break some clients.
44+
#
45+
#TLSOptions AllowClientRenegotiations
46+
#
47+
TLSOptions NoSessionReuseRequired AllowClientRenegotiations
48+
# Authenticate clients that want to use FTP over TLS?
49+
#
50+
#TLSVerifyClient off
51+
#
52+
# Are clients required to use FTP over TLS when talking to this server?
53+
#
54+
TLSRequired off
55+
#
56+
# Allow SSL/TLS renegotiations when the client requests them, but
57+
# do not force the renegotations. Some clients do not support
58+
# SSL/TLS renegotiations; when mod_tls forces a renegotiation, these
59+
# clients will close the data connection, or there will be a timeout
60+
# on an idle data connection.
61+
#
62+
TLSRenegotiate required off
63+
</IfModule>

0 commit comments

Comments
 (0)