ftpd.8 (bad2f716f4d3453fb9156b603cfaca44ea30fa31) | ftpd.8 (0aa2700123e22c2b0a977375e087dc2759b8e980) |
---|---|
1.\" Copyright (c) 1985, 1988, 1991, 1993 2.\" The Regents of the University of California. All rights reserved. 3.\" 4.\" Redistribution and use in source and binary forms, with or without 5.\" modification, are permitted provided that the following conditions 6.\" are met: 7.\" 1. Redistributions of source code must retain the above copyright 8.\" notice, this list of conditions and the following disclaimer. --- 342 unchanged lines hidden (view full) --- 351.Nm 352utility authenticates users according to six rules. 353.Bl -enum -offset indent 354.It 355The login name must be in the password data base 356and not have a null password. 357In this case a password must be provided by the client before any 358file operations may be performed. | 1.\" Copyright (c) 1985, 1988, 1991, 1993 2.\" The Regents of the University of California. All rights reserved. 3.\" 4.\" Redistribution and use in source and binary forms, with or without 5.\" modification, are permitted provided that the following conditions 6.\" are met: 7.\" 1. Redistributions of source code must retain the above copyright 8.\" notice, this list of conditions and the following disclaimer. --- 342 unchanged lines hidden (view full) --- 351.Nm 352utility authenticates users according to six rules. 353.Bl -enum -offset indent 354.It 355The login name must be in the password data base 356and not have a null password. 357In this case a password must be provided by the client before any 358file operations may be performed. |
359If the user has an OPIE key, the response from a successful USER 360command will include an OPIE challenge. 361The client may choose to respond with a PASS command giving either 362a standard password or an OPIE one-time password. 363The server will automatically determine which type of 364password it has been given and attempt to authenticate accordingly. 365See 366.Xr opie 4 367for more information on OPIE authentication. | |
368.It 369The login name must not appear in the file 370.Pa /etc/ftpusers . 371.It 372The login name must not be a member of a group specified in the file 373.Pa /etc/ftpusers . 374Entries in this file interpreted as group names are prefixed by an "at" 375.Ql \&@ --- 182 unchanged lines hidden (view full) --- 558.It Pa /var/spool/ftp 559Recommended directory for the FTP root directory 560(the home directory of the ftp user). 561.El 562.Sh SEE ALSO 563.Xr ftp 1 , 564.Xr umask 2 , 565.Xr getusershell 3 , | 359.It 360The login name must not appear in the file 361.Pa /etc/ftpusers . 362.It 363The login name must not be a member of a group specified in the file 364.Pa /etc/ftpusers . 365Entries in this file interpreted as group names are prefixed by an "at" 366.Ql \&@ --- 182 unchanged lines hidden (view full) --- 549.It Pa /var/spool/ftp 550Recommended directory for the FTP root directory 551(the home directory of the ftp user). 552.El 553.Sh SEE ALSO 554.Xr ftp 1 , 555.Xr umask 2 , 556.Xr getusershell 3 , |
566.Xr opie 4 , | |
567.Xr ftpchroot 5 , 568.Xr login.conf 5 , 569.Xr inetd 8 , 570.Xr syslogd 8 571.Sh HISTORY 572The 573.Nm 574utility appeared in 575.Bx 4.2 . 576IPv6 support was added in WIDE Hydrangea IPv6 stack kit. 577.Sh BUGS 578The server must run as the super-user 579to create sockets with privileged port numbers. 580It maintains 581an effective user id of the logged in user, reverting to 582the super-user only when binding addresses to sockets. 583The 584possible security holes have been extensively 585scrutinized, but are possibly incomplete. | 557.Xr ftpchroot 5 , 558.Xr login.conf 5 , 559.Xr inetd 8 , 560.Xr syslogd 8 561.Sh HISTORY 562The 563.Nm 564utility appeared in 565.Bx 4.2 . 566IPv6 support was added in WIDE Hydrangea IPv6 stack kit. 567.Sh BUGS 568The server must run as the super-user 569to create sockets with privileged port numbers. 570It maintains 571an effective user id of the logged in user, reverting to 572the super-user only when binding addresses to sockets. 573The 574possible security holes have been extensively 575scrutinized, but are possibly incomplete. |