How To Set Up VSFTPD For A User's Directory On Ubuntu 18.04 - DigitalOcean
How To Set Up VSFTPD For A User's Directory On Ubuntu 18.04 - DigitalOcean
FTP, short for File Transfer Protocol, is a network protocol that was once widely used for
moving files between a client and server. It has since been replaced by faster, more secure,
and more convenient ways of delivering files. Many casual Internet users expect to download
directly from their web browser with https , and command-line users are more likely to use
secure protocols such as the scp or SFTP.
FTP is still used to support legacy applications and workflows with very specific needs. If you
have a choice of what protocol to use, consider exploring the more modern options. When
you do need FTP, however, vsftpd is an excellent choice. Optimized for security, performance,
and stability, vsftpd offers strong protection against many security problems found in other
FTP servers and is the default for many Linux distributions.
In this tutorial, you'll configure vsftpd to allow a user to upload files to his or her home
directory using FTP with login credentials secured by SSL/TLS.
Prerequisites
To follow along with this tutorial you will need:
An Ubuntu 18.04 server, and a non-root user with sudo privileges: You can learn more about
how to set up a user with these privileges in our Initial Server Setup with Ubuntu 18.04 guide.
When the installation is complete, let's copy the configuration file so we can start with a blank
configuration, saving the original as a backup:
With a backup of the configuration in place, we're ready to configure the firewall.
Output
Status: active
To Action From
-- ------ ----
OpenSSH ALLOW Anywhere
OpenSSH (v6) ALLOW Anywhere (v6)
You may have other rules in place or no firewall rules at all. Since only SSH traffic is permitted
in this case, we’ll need to add rules for FTP traffic.
Let's open ports 20 and 21 for FTP, port 990 for when we enable TLS, and ports 40000-
50000 for the range of passive ports we plan to set in the configuration file:
Output
Status: active
To Action From
-- ------ ----
OpenSSH ALLOW Anywhere
990/tcp ALLOW Anywhere
20/tcp ALLOW Anywhere
21/tcp ALLOW Anywhere
40000:50000/tcp ALLOW Anywhere
OpenSSH (v6) ALLOW Anywhere (v6)
20/tcp (v6) ALLOW Anywhere (v6)
21/tcp (v6) ALLOW Anywhere (v6)
990/tcp (v6) ALLOW Anywhere (v6)
40000:50000/tcp (v6) ALLOW Anywhere (v6)
With vsftpd installed and the necessary ports open, let's move on to creating a dedicated
FTP user.
Assign a password when prompted. Feel free to press ENTER through the other prompts.
In this example, rather than removing write privileges from the home directory, let's create
an ftp directory to serve as the chroot and a writable files directory to hold the actual
files.
Output
total 8
4 dr-xr-xr-x 2 nobody nogroup 4096 Aug 24 21:29 .
4 drwxr-xr-x 3 sammy sammy 4096 Aug 24 21:29 ..
Next, let's create the directory for file uploads and assign ownership to the user:
Output
total 12
dr-xr-xr-x 3 nobody nogroup 4096 Aug 26 14:01 .
drwxr-xr-x 3 sammy sammy 4096 Aug 26 13:59 ..
drwxr-xr-x 2 sammy sammy 4096 Aug 26 14:01 files
Now that we've secured the ftp directory and allowed the user access to
the files directory, let's modify our configuration.
/etc/vsftpd.conf
. . .
# Allow anonymous FTP? (Disabled by default).
anonymous_enable=NO
#
# Uncomment this to allow local users to log in.
local_enable=YES
. . .
Next, let's enable the user to upload files by uncommenting the write_enable setting:
/etc/vsftpd.conf
. . .
write_enable=YES
. . .
We’ll also uncomment the chroot to prevent the FTP-connected user from accessing any
files or commands outside the directory tree:
/etc/vsftpd.conf
. . .
chroot_local_user=YES
. . .
Let's also add a user_sub_token to insert the username in our local_root directory path
so our configuration will work for this user and any additional future users. Add these settings
anywhere in the file:
/etc/vsftpd.conf
. . .
user_sub_token=$USER
local_root=/home/$USER/ftp
Let's also limit the range of ports that can be used for passive FTP to make sure enough
connections are available:
/etc/vsftpd.conf
. . .
pasv_min_port=40000
pasv_max_port=50000
Note: In step 2, we opened the ports that we set here for the passive port range. If you change
the values, be sure to update your firewall settings.
To allow FTP access on a case-by-case basis, let's set the configuration so that users have
access only when they are explicitly added to a list, rather than by default:
/etc/vsftpd.conf
. . .
userlist_enable=YES
userlist_file=/etc/vsftpd.userlist
userlist_deny=NO
userlist_deny toggles the logic: When it is set to YES , users on the list are denied FTP
access. When it is set to NO , only users on the list are allowed access.
When you're done making the changes, save the file and exit the editor.
Finally, let's add our user to /etc/vsftpd.userlist . Use the -a flag to append to the file:
Output
sammy
Anonymous users should fail to connect: We've disabled anonymous access. Let's test that by
trying to connect anonymously. If our configuration is set up properly, anonymous users
should be denied permission. Open another terminal window and run the following
command. Be sure to replace 203.0.113.0 with your server's public IP address:
ftp -p 203.0.113.0
Output
Connected to 203.0.113.0.
220 (vsFTPd 3.0.3)
Name (203.0.113.0:default): anonymous
530 Permission denied.
ftp: Login failed.
ftp>
bye
Users other than sammy should fail to connect: Next, let's try connecting as our sudo user.
They should also be denied access, and it should happen before they're allowed to enter their
password:
ftp -p 203.0.113.0
Output
Connected to 203.0.113.0.
220 (vsFTPd 3.0.3)
Name (203.0.113.0:default): sudo_user
530 Permission denied.
ftp: Login failed.
ftp>
bye
The user sammy should be able to connect, read, and write files: Let's make sure that our
designated user can connect:
ftp -p 203.0.113.0
Output
Connected to 203.0.113.0.
220 (vsFTPd 3.0.3)
Name (203.0.113.0:default): sammy
331 Please specify the password.
Password: your_user's_password
230 Login successful.
Remote system type is UNIX.
Using binary mode to transfer files.
ftp>
Let's change into the files directory and use the get command to transfer the test file we
created earlier to our local machine:
cd files
get test.txt
Output
227 Entering Passive Mode (203,0,113,0,169,12).
150 Opening BINARY mode data connection for test.txt (16 bytes).
226 Transfer complete.
16 bytes received in 0.0101 seconds (1588 bytes/s)
ftp>
Next, let's upload the file with a new name to test write permissions:
Output
227 Entering Passive Mode (203,0,113,0,164,71).
150 Ok to send data.
226 Transfer complete.
16 bytes sent in 0.000894 seconds (17897 bytes/s)
bye
Now that we've tested our configuration, let's take steps to further secure our server.
Let's use openssl to create a new certificate and use the -days flag to make it valid for one
year. In the same command, we'll add a private 2048-bit RSA key. By setting both the -
keyout and -out flags to the same value, the private key and the certificate will be located in
the same file:
sudo openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/ssl/private/vsftpd.
You'll be prompted to provide address information for your certificate. Substitute your own
information for the highlighted values below:
Output
Generating a 2048 bit RSA private key
............................................................................+++
...........+++
writing new private key to '/etc/ssl/private/vsftpd.pem'
-----
You are about to be asked to enter information that will be incorporated
into your certificate request.
What you are about to enter is what is called a Distinguished Name or a DN.
There are quite a few fields but you can leave some blank
For some fields there will be a default value,
If you enter '.', the field will be left blank.
-----
Country Name (2 letter code) [AU]:US
State or Province Name (full name) [Some-State]:NY
Locality Name (eg, city) []:New York City
Organization Name (eg, company) [Internet Widgits Pty Ltd]:DigitalOcean
Organizational Unit Name (eg, section) []:
Common Name (e.g. server FQDN or YOUR name) []: your_server_ip
Email Address []:
For more detailed information about the certificate flags, see OpenSSL Essentials: Working
with SSL Certificates, Private Keys and CSRs
Once you've created the certificates, open the vsftpd configuration file again:
Toward the bottom of the file, you will see two lines that begin with rsa_ . Comment them
out so they look like this:
/etc/vsftpd.conf
. . .
# rsa_cert_file=/etc/ssl/certs/ssl-cert-snakeoil.pem
# rsa_private_key_file=/etc/ssl/private/ssl-cert-snakeoil.key
. . .
Below them, add the following lines that point to the certificate and private key we just
created:
/etc/vsftpd.conf
. . .
rsa_cert_file=/etc/ssl/private/vsftpd.pem
rsa_private_key_file=/etc/ssl/private/vsftpd.pem
. . .
After that, we will force the use of SSL, which will prevent clients that can't deal with TLS from
connecting. This is necessary to ensure that all traffic is encrypted, but it may force your FTP
user to change clients. Change ssl_enable to YES :
/etc/vsftpd.conf
. . .
ssl_enable=YES
. . .
After that, add the following lines to explicitly deny anonymous connections over SSL and to
require SSL for both data transfer and logins:
/etc/vsftpd.conf
. . .
allow_anon_ssl=NO
force_local_data_ssl=YES
force_local_logins_ssl=YES
. . .
After this, configure the server to use TLS, the preferred successor to SSL, by adding the
following lines:
/etc/vsftpd.conf
. . .
ssl_tlsv1=YES
ssl_sslv2=NO
ssl_sslv3=NO
. . .
Finally, we will add two more options. First, we will not require SSL reuse because it can break
many FTP clients. We will require "high" encryption cipher suites, which currently means key
lengths equal to or greater than 128 bits:
/etc/vsftpd.conf
. . .
require_ssl_reuse=NO
ssl_ciphers=HIGH
. . .
/etc/vsftpd.conf
# This option specifies the location of the RSA certificate to use for SSL
# encrypted connections.
#rsa_cert_file=/etc/ssl/certs/ssl-cert-snakeoil.pem
#rsa_private_key_file=/etc/ssl/private/ssl-cert-snakeoil.key
rsa_cert_file=/etc/ssl/private/vsftpd.pem
rsa_private_key_file=/etc/ssl/private/vsftpd.pem
ssl_enable=YES
allow_anon_ssl=NO
force_local_data_ssl=YES
force_local_logins_ssl=YES
ssl_tlsv1=YES
ssl_sslv2=NO
ssl_sslv3=NO
require_ssl_reuse=NO
ssl_ciphers=HIGH
At this point, we will no longer be able to connect with an insecure command-line client. If we
tried, we'd see something like:
Output
ftp -p 203.0.113.0
Connected to 203.0.113.0.
220 (vsFTPd 3.0.3)
Name (203.0.113.0:default): sammy
530 Non-anonymous sessions must use encryption.
ftp: Login failed.
421 Service not available, remote server has closed connection
ftp>
Next, let's verify that we can connect using a client that supports TLS.
When you first open FileZilla, find the Site Manager icon just above the word Host, the left-
most icon on the top row. Click it:
A new window will open. Click the New Site button in the bottom right corner:
Under My Sites a new icon with the words New site will appear. You can name it now or
return later and use the Rename button.
Fill out the Host field with the name or IP address. Under the Encryption drop down menu,
select Require explicit FTP over TLS.
For Logon Type, select Ask for password. Fill in your FTP user in the User field:
Click Connect at the bottom of the interface. You will be asked for the user's password:
Click OK to connect. You should now be connected with your server with TLS/SSL encryption.
Upon success, you will be presented with a server certificate that looks like this:
When you’ve accepted the certificate, double-click the files folder and drag upload.txt to
the left to confirm that you’re able to download files:
When you’ve done that, right-click on the local copy, rename it to upload-tls.txt and drag
it back to the server to confirm that you can upload files:
You’ve now confirmed that you can securely and successfully transfer files with SSL/TLS
enabled.
Add a message telling the user why they are unable to log in:
/bin/ftponly
#!/bin/sh
echo "This account is limited to FTP access only."
/etc/shells
. . .
/bin/ftponly
ssh sammy@your_server_ip
You should see something like:
Output
This account is limited to FTP access only.
Connection to 203.0.113.0 closed.
This confirms that the user can no longer ssh to the server and is limited to FTP access only.
Conclusion
In this tutorial we covered setting up FTP for users with a local account. If you need to use an
external authentication source, you might want to look into vsftpd 's support of virtual users.
This offers a rich set of options through the use of PAM, the Pluggable Authentication
Modules, and is a good choice if you manage users in another system such as LDAP or
Kerberos.