VSFTPD Login incorrect

Bonjour

Je cherche depuis plusieurs heures la réponse à mon problème, j’ai recommencé 3x l’installation de mon serveur ftp mais ça ne fonctionne toujours pas, je vous demande donc de l’aide.
Voici mon problème :

Lorsque j’essaie de me connecter à mon ftp, voici la réponse de Filezilla :

[quote]Commande : USER MON_USER
Réponse : 331 Please specify the password.
Commande : PASS ********
Réponse : 530 Login incorrect.
Erreur : Erreur critique : Impossible d’établir une connexion au serveur[/quote]

Voici la configuration de mon serveur :

[code]# Example config file /etc/vsftpd.conf

The default compiled in settings are fairly paranoid. This sample file

loosens things up a bit, to make the ftp daemon more usable.

Please see vsftpd.conf.5 for all compiled in defaults.

READ THIS: This example file is NOT an exhaustive list of vsftpd options.

Please read the vsftpd.conf.5 manual page to get a full idea of vsftpd’s

capabilities.

Run standalone? vsftpd can run either from an inetd or as a standalone

daemon started from an initscript.

listen=YES

Run standalone with IPv6?

Like the listen parameter, except vsftpd will listen on an IPv6 socket

instead of an IPv4 one. This parameter and the listen parameter are mutually

exclusive.

#listen_ipv6=YES

Allow anonymous FTP? (Beware - allowed by default if you comment this out).

anonymous_enable=NO

Uncomment this to allow local users to log in.

local_enable=YES

Uncomment this to enable any form of FTP write command.

write_enable=NO

Default umask for local users is 077. You may wish to change this to 022,

if your users expect that (022 is used by most other ftpd’s)

#local_umask=022

Uncomment this to allow the anonymous FTP user to upload files. This only

has an effect if the above global write enable is activated. Also, you will

obviously need to create a directory writable by the FTP user.

#anon_upload_enable=YES

Uncomment this if you want the anonymous FTP user to be able to create

new directories.

#anon_mkdir_write_enable=YES

Activate directory messages - messages given to remote users when they

go into a certain directory.

dirmessage_enable=YES

If enabled, vsftpd will display directory listings with the time

in your local time zone. The default is to display GMT. The

times returned by the MDTM FTP command are also affected by this

option.

use_localtime=YES

Activate logging of uploads/downloads.

xferlog_enable=YES

Make sure PORT transfer connections originate from port 20 (ftp-data).

connect_from_port_20=YES

If you want, you can arrange for uploaded anonymous files to be owned by

a different user. Note! Using “root” for uploaded files is not

recommended!

#chown_uploads=YES
#chown_username=whoever

You may override where the log file goes if you like. The default is shown

below.

#xferlog_file=/var/log/vsftpd.log

If you want, you can have your log file in standard ftpd xferlog format.

Note that the default log file location is /var/log/xferlog in this case.

#xferlog_std_format=YES

You may change the default value for timing out an idle session.

#idle_session_timeout=600

You may change the default value for timing out a data connection.

#data_connection_timeout=120

It is recommended that you define on your system a unique user which the

ftp server can use as a totally isolated and unprivileged user.

#nopriv_user=ftpsecure

Enable this and the server will recognise asynchronous ABOR requests. Not

recommended for security (the code is non-trivial). Not enabling it,

however, may confuse older FTP clients.

#async_abor_enable=YES

By default the server will pretend to allow ASCII mode but in fact ignore

the request. Turn on the below options to have the server actually do ASCII

mangling on files when in ASCII mode.

Beware that on some FTP servers, ASCII support allows a denial of service

attack (DoS) via the command “SIZE /big/file” in ASCII mode. vsftpd

predicted this attack and has always been safe, reporting the size of the

raw file.

ASCII mangling is a horrible feature of the protocol.

#ascii_upload_enable=YES
#ascii_download_enable=YES

You may fully customise the login banner string:

ftpd_banner=Bienvenuue sur le serveur FTP W33BOX

You may specify a file of disallowed anonymous e-mail addresses. Apparently

useful for combatting certain DoS attacks.

#deny_email_enable=YES

(default follows)

#banned_email_file=/etc/vsftpd.banned_emails

You may restrict local users to their home directories. See the FAQ for

the possible risks in this before using chroot_local_user or

chroot_list_enable below.

#chroot_local_user=YES

You may specify an explicit list of local users to chroot() to their home

directory. If chroot_local_user is YES, then this list becomes a list of

users to NOT chroot().

(Warning! chroot’ing can be very dangerous. If using chroot, make sure that

the user does not have write access to the top level directory within the

chroot)

#chroot_local_user=YES
#chroot_list_enable=YES

(default follows)

#chroot_list_file=/etc/vsftpd.chroot_list

You may activate the “-R” option to the builtin ls. This is disabled by

default to avoid remote users being able to cause excessive I/O on large

sites. However, some broken FTP clients such as “ncftp” and “mirror” assume

the presence of the “-R” option, so there is a strong case for enabling it.

#ls_recurse_enable=YES

Customization

Some of vsftpd’s settings don’t fit the filesystem layout by

default.

This option should be the name of a directory which is empty. Also, the

directory should not be writable by the ftp user. This directory is used

as a secure chroot() jail at times vsftpd does not require filesystem

access.

secure_chroot_dir=/var/run/vsftpd

This string is the name of the PAM service vsftpd will use.

pam_service_name=vsftpd

This option specifies the location of the RSA certificate to use for SSL

encrypted connections.

#rsa_cert_file=/etc/ssl/private/vsftpd.pem

chroot_local_user=YES
chroot_list_enable=YES

chroot_list_file=/etc/vsftpd/chroot.list

Options for SSL

encrypted connections.

ssl_enable=NO
allow_anon_ssl=NO
force_local_data_ssl=NO
force_local_logins_ssl=YES

require_ssl_reuse=NO # Certains clients FTP nécessitent cette ligne

ssl_tlsv1=YES
ssl_sslv2=YES
ssl_sslv3=YES

rsa_cert_file=/etc/ssl/private/vsftpd.cert.pem
rsa_private_key_file=/etc/ssl/private/vsftpd.key.pem

pasv_enable=YES
pasv_promiscuous=NO
pasv_min_port=40000
pasv_max_port=40100
pasv_address=w33box.com
pasv_addr_resolve=YES
port_promiscuous=NO

‘guest_enable’ est très important: cela active les utilisateurs virtuels!

‘guest_username’ fait correspondre tous les utilisateurs virtuels à

l’utilisateur ‘ftp’ que nous avons défini plus haut, et au home

correspondant: ‘/home/ftp/’.

guest_enable=YES
guest_username=ftp

On défini le nombre maximum de sessions à 200(les nouveaux clients recevront

un message du genre: “erreur: serveur occupé”).

On défini le nombre maximum de sessions par IP à 4

max_clients=200
max_per_ip=4

Activer la configuration per-user

user_config_dir=/etc/vsftpd/vsftpd_user_conf[/code]

Voici le log de VSFTPD :

[quote]Mon Mar 9 18:25:29 2015 [pid 4073] CONNECT: Client "XXX.XXX.XXX.XXX"
Mon Mar 9 18:25:29 2015 [pid 4072] [MON_USER] FAIL LOGIN: Client “XXX.XXX.XXX.XXX”[/quote]

Et ennfin le log auth :

[quote]Mar 9 18:25:29 vps90726 vsftpd: pam_userdb(vsftpd:auth): user_lookup: could not open database `/etc/vsftpd/login.db
’: No such file or directory
Mar 9 18:25:56 vps90726 sshd[4094]: Accepted password for root from 86.212.145.254 port 59300 ssh2
Mar 9 18:25:56 vps90726 sshd[4094]: pam_unix(sshd:session): session opened for user root by (uid=0)
Mar 9 18:25:56 vps90726 sshd[4094]: subsystem request for sftp by user root[/quote]

Je tiens à préciser que, de plus, le fichier /etc/vsftpd/login.db existe bel et bien…
Je ne comprend pas.

Merci par avance de votre aide

bonsoir.

avez vous redirigé le port21? vous connectez vous en local depuis votre client ou depuis un client/site extérieur?Si j’ai bonne mémoire pour se connecter en local il faut utiliser l’adresse ip local en 192.168…1.xxx sous peine de se voir jeté par filezilla.
Pour tester depuis un site extérieur:

infobyip.com/ftptest.php