On Thu, Apr 17, 2008 at 1:14 PM, stolendata. net
<[EMAIL PROTECTED]> wrote:
>
> On Mon, Apr 14, 2008 at 6:38 AM, Almir Karic <[EMAIL PROTECTED]> wrote:
> On Sun, Apr 13, 2008 at 7:37 PM, Manuel Heckel <[EMAIL PROTECTED]> wrote:
>  > Hi,
>  >
>  >  me again here. if it's the wrong place to ask, please tell me.
>  >
>  >  i still have problems with vsftp and ssl, but i don't think it's a
>  >  problem of vsftpd. from my intern lan everything works fine, just from
>  >  outside the connections get dropped when the TLS starts. my config: pf
>  >  with nat and ftp-proxy for the ftp connections from inside; vsftpd on
>  >  the same machine, listening on port 21, forced ssl. as said, from my lan
>  >  everthing works fine, from the outside only without SSL.
>
>  vhy not use scp or sftp? they are sane protocols that don't require
>  things like ftp-proxy(8) to work.
>
>  --
>  error: one bad user found in front of screen
>
>

Current SFTP solution of OpenSSH also lacks anything even remotely
resembling the convenience VSFTPD offers for chrooted access to local
users and userlists. The recent additions to OpenSSH enables
administrators to jail their users, sure, but it does this in a way so
clumsy that it trips over itself; solutions like hiding your users in
nested dir's just to allow a shared httpd setup etc.. It's a good
start, but it's very awkward. I clearly see the benefits of staying
with the data-port / passive/active annoyances of FTP over TLS using
VSFTPD.

- SD

Reply via email to