Anonymous FTP Server

Total Page:16

File Type:pdf, Size:1020Kb

Anonymous FTP Server Anonymous FTP Server Setting up an anonymous FTP server is relatively easy, but you must do it correctly because you are potentially giving access to your system to everybody on the network. To set up anonymous FTP, you must create a special account with the name ftp. For example ftp:*:400:40:Anonymous FTP:/var/spool/ftp:/bin/false Files that are available by anonymous FTP will be placed in the ftp home directory. You should therefore make the home directory in a special place, such as /var/spool/ftp. When it is used for anonymous FTP, ftpd uses the chroot() function call to change the root directory of the perceived filesystem to the home directory of the ftp account. For this reason, you must set up that account’s home directory as a mini-filesystem. Three directories go into this mini-filesystem: bin This directory holds a copy of the /bin/ls program, which ftpd uses to list files. If your system uses dynamic linking and shared libraries, you must either install programs that are statically linked or install the dynamic libraries in the appropriate directory, e.g. /var/spool/ftp/lib. etc This directory holds a version of the /etc/passwd and optionally /etc/group files, which are put there so that the /bin/ls command will print usernames and groupnames when it lists files. Replace the encrypted passwords in these files with asterisks. Some security-conscious sites may wish to delete some or all account names from the passwd file. The only account name that needs to be present is ftp. Actually, if neither file exists, most FTP servers will still work normally. pub This directory, short for “public” holds the files that are actually made available for anonymous FTP transfer. You can have as many subdirectories as you wish in the pub directory. Be sure to place copies of the actual files or hard links to them in the mini-filesystem rather than using symbolic links pointing to other places on your system. Because the ftpd program uses the chroot() system call, symbolic links may not behave properly with anonymous FTP. In general, symbolic links to inside your chroot area will work, and they are commonly used on anonymous FTP suites. However, any symbolic link that points outside the chroot area or is an absolute link will not work. To create an anonymous FTP site, the following actions need to occur: 1. Create the ftp user id 2. Set up ~ftp/bin 3. Set up ~ftp/etc 4. Set up ~ftp/pub 5. Secure the ~ftp directory Many ftp servers work fine if the only entries in the passwd file are for root and ftp, and the only entry in the group file is for group ftp. The only side effect is that files left in the ftp directories will show numeric owners and groups when clients do a directory listing. The advantage to having a trimmed file is that even if outsiders do obtain a copy of the file, they will not be able to gain any clues as to your system’s usernames. The disadvantage is that the dir command will not show symbolic usernames. Allowing Only FTP Access Sometimes, you may wish to give people permission to FTP files to and from your system, but you may not want to give them permission to actually log in. One simple way to accomplish this goal is to set up the person’s account with a special shell, such as /bin/ftponly. The following will allow for this situation: 1. Create a shell script /bin/ftponly, which prints a polite message if the user attempts to log into her account. An example is: #!/bin/sh /bin/cat << XX You may use FTP to put files on this system, but you may not Use this account to login. --The Management XX /usr/bin/sleep 20 2. Create your user account with /bin/ftponly as its shell. grossman:Mqu310QJ4akf/E:400:40:Harold Grossman:/export/home/grossman:/bin/ftponly 3. Finally, add the file /bin/ftponly to the file /etc/shells: # List of acceptable shells for chsh passwd –s # Ftpd will not allow users to connect who do not have one of these shells # /bin/sh /bin/csh /bin/ftponly .
Recommended publications
  • Unix Introduction
    Unix introduction Mikhail Dozmorov Summer 2018 Mikhail Dozmorov Unix introduction Summer 2018 1 / 37 What is Unix Unix is a family of operating systems and environments that exploits the power of linguistic abstractions to perform tasks Unix is not an acronym; it is a pun on “Multics”. Multics was a large multi-user operating system that was being developed at Bell Labs shortly before Unix was created in the early ’70s. Brian Kernighan is credited with the name. All computational genomics is done in Unix http://www.read.seas.harvard.edu/~kohler/class/aosref/ritchie84evolution.pdfMikhail Dozmorov Unix introduction Summer 2018 2 / 37 History of Unix Initial file system, command interpreter (shell), and process management started by Ken Thompson File system and further development from Dennis Ritchie, as well as Doug McIlroy and Joe Ossanna Vast array of simple, dependable tools that each do one simple task Ken Thompson (sitting) and Dennis Ritchie working together at a PDP-11 Mikhail Dozmorov Unix introduction Summer 2018 3 / 37 Philosophy of Unix Vast array of simple, dependable tools Each do one simple task, and do it really well By combining these tools, one can conduct rather sophisticated analyses The Linux help philosophy: “RTFM” (Read the Fine Manual) Mikhail Dozmorov Unix introduction Summer 2018 4 / 37 Know your Unix Unix users spend a lot of time at the command line In Unix, a word is worth a thousand mouse clicks Mikhail Dozmorov Unix introduction Summer 2018 5 / 37 Unix systems Three common types of laptop/desktop operating systems: Windows, Mac, Linux. Mac and Linux are both Unix-like! What that means for us: Unix-like operating systems are equipped with “shells”" that provide a command line user interface.
    [Show full text]
  • Introduction to Unix
    Introduction to Unix Rob Funk <[email protected]> University Technology Services Workstation Support http://wks.uts.ohio-state.edu/ University Technology Services Course Objectives • basic background in Unix structure • knowledge of getting started • directory navigation and control • file maintenance and display commands • shells • Unix features • text processing University Technology Services Course Objectives Useful commands • working with files • system resources • printing • vi editor University Technology Services In the Introduction to UNIX document 3 • shell programming • Unix command summary tables • short Unix bibliography (also see web site) We will not, however, be covering these topics in the lecture. Numbers on slides indicate page number in book. University Technology Services History of Unix 7–8 1960s multics project (MIT, GE, AT&T) 1970s AT&T Bell Labs 1970s/80s UC Berkeley 1980s DOS imitated many Unix ideas Commercial Unix fragmentation GNU Project 1990s Linux now Unix is widespread and available from many sources, both free and commercial University Technology Services Unix Systems 7–8 SunOS/Solaris Sun Microsystems Digital Unix (Tru64) Digital/Compaq HP-UX Hewlett Packard Irix SGI UNICOS Cray NetBSD, FreeBSD UC Berkeley / the Net Linux Linus Torvalds / the Net University Technology Services Unix Philosophy • Multiuser / Multitasking • Toolbox approach • Flexibility / Freedom • Conciseness • Everything is a file • File system has places, processes have life • Designed by programmers for programmers University Technology Services
    [Show full text]
  • “Linux at the Command Line” Don Johnson of BU IS&T  We’Ll Start with a Sign in Sheet
    “Linux at the Command Line” Don Johnson of BU IS&T We’ll start with a sign in sheet. We’ll end with a class evaluation. We’ll cover as much as we can in the time allowed; if we don’t cover everything, you’ll pick it up as you continue working with Linux. This is a hands-on, lab class; ask questions at any time. Commands for you to type are in BOLD The Most Common O/S Used By BU Researchers When Working on a Server or Computer Cluster Linux is a Unix clone begun in 1991 and written from scratch by Linus Torvalds with assistance from a loosely-knit team of hackers across the Net. 64% of the world’s servers run some variant of Unix or Linux. The Android phone and the Kindle run Linux. a set of small Linux is an O/S core programs written by written by Linus Richard Stallman and Torvalds and others others. They are the AND GNU utilities. http://www.gnu.org/ Network: ssh, scp Shells: BASH, TCSH, clear, history, chsh, echo, set, setenv, xargs System Information: w, whoami, man, info, which, free, echo, date, cal, df, free Command Information: man, info Symbols: |, >, >>, <, ;, ~, ., .. Filters: grep, egrep, more, less, head, tail Hotkeys: <ctrl><c>, <ctrl><d> File System: ls, mkdir, cd, pwd, mv, touch, file, find, diff, cmp, du, chmod, find File Editors: gedit, nedit You need a “xterm” emulation – software that emulates an “X” terminal and that connects using the “SSH” Secure Shell protocol. ◦ Windows Use StarNet “X-Win32:” http://www.bu.edu/tech/support/desktop/ distribution/xwindows/xwin32/ ◦ Mac OS X “Terminal” is already installed Why? Darwin, the system on which Apple's Mac OS X is built, is a derivative of 4.4BSD-Lite2 and FreeBSD.
    [Show full text]
  • Shell Variables
    Shell Using the command line Orna Agmon ladypine at vipe.technion.ac.il Haifux Shell – p. 1/55 TOC Various shells Customizing the shell getting help and information Combining simple and useful commands output redirection lists of commands job control environment variables Remote shell textual editors textual clients references Shell – p. 2/55 What is the shell? The shell is the wrapper around the system: a communication means between the user and the system The shell is the manner in which the user can interact with the system through the terminal. The shell is also a script interpreter. The simplest script is a bunch of shell commands. Shell scripts are used in order to boot the system. The user can also write and execute shell scripts. Shell – p. 3/55 Shell - which shell? There are several kinds of shells. For example, bash (Bourne Again Shell), csh, tcsh, zsh, ksh (Korn Shell). The most important shell is bash, since it is available on almost every free Unix system. The Linux system scripts use bash. The default shell for the user is set in the /etc/passwd file. Here is a line out of this file for example: dana:x:500:500:Dana,,,:/home/dana:/bin/bash This line means that user dana uses bash (located on the system at /bin/bash) as her default shell. Shell – p. 4/55 Starting to work in another shell If Dana wishes to temporarily use another shell, she can simply call this shell from the command line: [dana@granada ˜]$ bash dana@granada:˜$ #In bash now dana@granada:˜$ exit [dana@granada ˜]$ bash dana@granada:˜$ #In bash now, going to hit ctrl D dana@granada:˜$ exit [dana@granada ˜]$ #In original shell now Shell – p.
    [Show full text]
  • LPI 101 – Work on the Command Line [5] (Linux Professional Institute Certification) A
    – LPI 101 – Work on the Command Line [5] (Linux Professional Institute Certification) a .˜. /V\ by: geoffrey robertson // \\ [email protected] @._.@ $Id: gl1.103.1.slides.tex,v 1.3 2003/05/30 05:09:04 waratah Exp $ a c Copyright 2002 Geoffrey Robertson, Andrew Eager. Permission is granted to make and distribute verbatim copies or modified versions of this document provided that this copyright notice and this permission notice are preserved on all copies under the terms of the GNU General Public License as published by the Free Software Foundation—either version 2 of the License or (at your option) any later version. 1 Work on the command line [5] Objective Candidate should be able to interact with shells and commands using the command line. This includes typing valid commands and command sequences, defining, referencing and exporting environment variables, using command history and editing facilities, invoking commands in the path and outside the path, using command substitution, applying commands recursively through a directory tree and using man to find about commands. 2 Work on the command line [5] Key files, terms, and utilities ¡ . ¡ man ¡ bash ¡ pwd ¡ echo ¡ set ¡ env ¡ unset ¡ ¡ exec ˜/.bash history ¡ ¡ export ˜/.profile 3 Work on the command line [5] Resources of interest LPI Certification in a Nutshell pp15—19 LPIC 1 Cert. Bible Chapter 2 Linux Shells by Example by Ellie Quigley 4 Shells Command Line Interface ¡ A shell is the program that provides a Command Line Interface to the operating system. 5 Shells may be accessed in various ways: – Virtual Console – Terminal attached to a serial line – Remote access over tcp/ip with telnet, rsh or ssh – An X terminal run on an X session, either on the local console or remotely See /etc/inittab Shells Command Line Interface ¡ A shell is the program that provides a Command Line Interface to the operating system.
    [Show full text]
  • CS246—Linux Command Summary
    CS246|Linux Command Summary Commands Command Meaning Options exit log out passwd change your password clear clear screen man command show the manual page for command man -k word show a list of man pages that mention word history display all previously-issued com- mands !! execute most recently-issued com- mand !c execute most recently-issued com- mand starting with c whoami display your login name date display current date and time pwd display current directory ls list contents of current directory ls -a show all files, including hidden files ls -l show in long format cp file1 file2 copy file1 to file2 cp -r dir1 dir2 recursively copy dir1 to dir2 mv file1 file2 move file1 to file2 (also use to re- name) rm file remove file can be used to recursively remove a directory, if -r option is used cd dir change directory to dir cd - return to most recently visited directory mkdir dir create new directory dir in current di- can specify more than one directory at once rectory rmdir dir remove directory dir only works if dir is empty; if not empty, use rm -r dir; can specify more than directory at once echo string display string to screen chmod perms file set permissions on file to perms chfn change personal info (name, address, etc.) on Unix system chsh change your login shell ps display current processes ps -a show all users' processes ps -A show ALL processes (incl. system processes) kill pid kill process with number pid kill -9 pid more forceful kill, for stubborn processes who show who is logged into this machine finger username show personal info for username time command show amount of time taken executing command fg bring background job to the fore- useful if you accidentally ran vi or emacs with an & ground find dir -name \pattern" find all files whose names match pat- tern in dir and its subdirectories 1 Tools Tool Purpose Options cat f1 f2 ..
    [Show full text]
  • Shells and Shell Programming
    Shells & Shell Programming (Part A) Software Tools EECS2031 Winter 2018 Manos Papagelis Thanks to Karen Reid and Alan J Rosenthal for material in these slides SHELLS 2 What is a Shell • A shell is a command line interpreter that is the interface between the user and the OS. • The shell: – analyzes each command – determines what actions are to be performed – performs the actions • Example: wc –l file1 > file2 3 Which shell? • sh – Bourne shell – Most common, other shells are a superset – Good for programming • csh or tcsh – command-line default on EECS labs – C-like syntax – Best for interactive use. • bash – default on Linux (Bourne again shell) – Based on sh, with some csh features. • korn – written by David Korn – Based on sh – Some claim best for programming. – Commercial product. 4 bash versus sh • On EECS labs, when you run sh, you are actually running bash. • bash is a superset of sh. • For EECS2031, you will be learning only the features of the language that belong to sh. 5 Changing your shell • I recommend changing your working shell on EECS to bash – It will make it easier to test your shell programs. – You will only need to learn one set of syntax. • What to do: – echo $SHELL (to check your current shell) – chsh <userid> bash – Logout and log back in. – .profile is executed every time you log in, so put your environment variables there 6 Standard Streams • Preconnected input and output channels between a computer program and its environment. There are 3 I/O connections: – standard input (stdin) – standard output (stdout) – standard
    [Show full text]
  • Linux Command Line Interface
    Linux Command Line Interface December 27, 2017 Foreword I It is supposed to be a refresher (?!) I If you are familiar with UNIX/Linux/MacOS X CLI, this is going to be boring... I I will not talk about editors (vi, emacs...) Basics I (Computer) Terminal: Hardware device for data entry and display; I Terminal Emulator (aka tty): An application program replacing a computer terminal. Many of those, OS dependent (cmd for DOS/Win; Terminal for OS X; xterm for Linux; ...); I The Terminal provides user access to the computer through the Command Line Interface (CLI) where the user issues commands. I The CLI "dialect" is the Shell. In UNIX-like systems a lot of dialects exists: sh, bash, csh, tcsh, ksh, zsh... I I will only use the bash shell. Shell I How to access a shell I Logging in to your own Linux (virtual) box (CTRL-ALT-F1/CTRL-ALT-F7); I Opening a graphic terminal (xterm...); I SSHing into a server. I To know which shell you use: echo $SHELL I use this font to denote commands I SHELL is an environment variable I echo is a command Commands I apropos: search the manual page names and descriptions I man: manual page (try man apropos, man man) Almost every command, system program, or API has a man page man apropos, man fread, man pthreads, man 1 open, man 2 open Reading man pages is a very worthwhile activity I Not everything is a command... type <cmd> type man (command), type echo (shell built-in), type ls (alias (well..
    [Show full text]
  • Linux Shell Scripting Cookbook Second Edition
    Linux Shell Scripting Cookbook Second Edition Over 110 practical recipes to solve real-world shell problems, guaranteed to make you wonder how you ever lived without them Shantanu Tushar Sarath Lakshman BIRMINGHAM - MUMBAI Linux Shell Scripting Cookbook Second Edition Copyright © 2013 Packt Publishing All rights reserved. No part of this book may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, without the prior written permission of the publisher, except in the case of brief quotations embedded in critical articles or reviews. Every effort has been made in the preparation of this book to ensure the accuracy of the information presented. However, the information contained in this book is sold without warranty, either express or implied. Neither the authors, nor Packt Publishing, and its dealers and distributors will be held liable for any damages caused or alleged to be caused directly or indirectly by this book. Packt Publishing has endeavored to provide trademark information about all of the companies and products mentioned in this book by the appropriate use of capitals. However, Packt Publishing cannot guarantee the accuracy of this information. First published: January 2011 Second edition: May 2013 Production Reference: 1140513 Published by Packt Publishing Ltd. Livery Place 35 Livery Street Birmingham B3 2PB, UK. ISBN 978-1-78216-274-2 www.packtpub.com Cover Image by Parag Kadam ([email protected]) Credits Authors Project Coordinator Shantanu Tushar Shiksha Chaturvedi Sarath Lakshman Proofreader Reviewers Linda Morris Rajeshwari K. John C. Kennedy Indexer Hemangini Bari Anil Kumar Sudhendu Kumar Production Coordinator Aravind SV Shantanu Zagade Acquisition Editor Cover Work Kartikey Pandey Shantanu Zagade Lead Technical Editor Ankita Shashi Technical Editors Jalasha D'costa Amit Ramadas Lubna Shaikh About the Authors Shantanu Tushar is an advanced GNU/Linux user since his college days.
    [Show full text]
  • Unix Command
    Veloce descrizione di comandi Unix Buona parte dei comandi dell’elenco seguente fanno parte della distribuzione standard di molte architetture Unix. Per i dettagli vedere le relative pagine di manuale, invocabili con il comando "man topic". a2p convertitore awk - perl amstex AmSTeX language create, modify, and extract from archives (per creare ar librerie) arch print machine architecture at, batch, atq, atrm - queue, examine or delete jobs for later at execution awk gawk - pattern scanning and processing language basename strip directory and suffix from filenames bash GNU Bourne-Again SHell bc An arbitrary precision calculator language bibtex make a bibliography for (La)TeX c++ GNU project C++ Compiler cal displays a calendar cat concatenate files and print on the standard output cc gcc, g++ - GNU project C and C++ Compiler checkalias usage: /usr/bin/checkalias alias .. chfn change your finger information chgrp change the group ownership of files chmod change the access permissions of files chown change the user and group ownership of files chsh change your login shell cksum checksum and count the bytes in a file clear clear terminal screen cmp compare two files col filter reverse line feeds from input column columnate lists comm compare two sorted files line by line compress compress, uncompress, zcat - compress and expand data cp copy files cpio copy files to and from archives tcsh - C shell with file name completion and command line csh editing csplit split a file into sections determined by context lines cut remove sections from each
    [Show full text]
  • A Generalization of CHSH and the Algebraic Structure of Optimal Strategies
    A generalization of CHSH and the algebraic structure of optimal strategies David Cui1, Arthur Mehta1, Hamoon Mousavi2, and Seyed Sajjad Nezhadi2 1Department of Mathematics, University of Toronto, Toronto, Canada. 2Department of Computer Science, University of Toronto, Toronto, Canada. Self-testing has been a rich area of study in quantum information theory. It allows an experimenter to interact classically with a black box quantum system and to test that a specific entangled state was present and a specific set of measurements were performed. Recently, self-testing has been central to high-profile results in complexity theory as seen in the work on entangled games PCP of Natarajan and Vidick (FOCS 2018), iterated compression by Fitzsimons et al. (STOC 2019), and NEEXP in MIP* due to Natarajan and Wright (FOCS 2019). The most studied self-test is the CHSH game which features a bipartite system with two isolated devices. This game certifies the presence of a single EPR entangled state and the use of anti-commuting Pauli measurements. Most of the self-testing literature has focused on extending these results to self-test for tensor products of EPR states and tensor products of Pauli measurements. In this work, we introduce an algebraic generalization of CHSH by viewing it as a linear constraint system (LCS) game, exhibiting self-testing properties that are qualitatively different. These provide the first example of LCS games that self-test non-Pauli operators resolving an open question posed by Coladangelo and Stark (QIP 2017). Our games also provide a self-test for states other than the maximally entangled state, and hence resolves the open question posed by Cleve and Mittal (ICALP 2012).
    [Show full text]
  • Basics of UNIX
    Basics of UNIX August 23, 2012 By UNIX, I mean any UNIX-like operating system, including Linux and Mac OS X. On the Mac you can access a UNIX terminal window with the Terminal application (under Applica- tions/Utilities). Most modern scientific computing is done on UNIX-based machines, often by remotely logging in to a UNIX-based server. 1 Connecting to a UNIX machine from {UNIX, Mac, Windows} See the file on bspace on connecting remotely to SCF. In addition, this SCF help page has infor- mation on logging in to remote machines via ssh without having to type your password every time. This can save a lot of time. 2 Getting help from SCF More generally, the department computing FAQs is the place to go for answers to questions about SCF. For questions not answered there, the SCF requests: “please report any problems regarding equipment or system software to the SCF staff by sending mail to ’trouble’ or by reporting the prob- lem directly to room 498/499. For information/questions on the use of application packages (e.g., R, SAS, Matlab), programming languages and libraries send mail to ’consult’. Questions/problems regarding accounts should be sent to ’manager’.” Note that for the purpose of this class, questions about application packages, languages, li- braries, etc. can be directed to me. 1 3 Files and directories 1. Files are stored in directories (aka folders) that are in a (inverted) directory tree, with “/” as the root of the tree 2. Where am I? > pwd 3. What’s in a directory? > ls > ls -a > ls -al 4.
    [Show full text]