Bonjour
Je cherche depuis plusieurs heures la réponse à mon problème, j’ai recommencé 3x l’installation de mon serveur ftp mais ça ne fonctionne toujours pas, je vous demande donc de l’aide.
Voici mon problème :
Lorsque j’essaie de me connecter à mon ftp, voici la réponse de Filezilla :
[quote]Commande : USER MON_USER
Réponse : 331 Please specify the password.
Commande : PASS ********
Réponse : 530 Login incorrect.
Erreur : Erreur critique : Impossible d’établir une connexion au serveur[/quote]
Voici la configuration de mon serveur :
[code]# Example config file /etc/vsftpd.conf
The default compiled in settings are fairly paranoid. This sample file
loosens things up a bit, to make the ftp daemon more usable.
Please see vsftpd.conf.5 for all compiled in defaults.
READ THIS: This example file is NOT an exhaustive list of vsftpd options.
Please read the vsftpd.conf.5 manual page to get a full idea of vsftpd’s
capabilities.
Run standalone? vsftpd can run either from an inetd or as a standalone
daemon started from an initscript.
listen=YES
Run standalone with IPv6?
Like the listen parameter, except vsftpd will listen on an IPv6 socket
instead of an IPv4 one. This parameter and the listen parameter are mutually
exclusive.
#listen_ipv6=YES
Allow anonymous FTP? (Beware - allowed by default if you comment this out).
anonymous_enable=NO
Uncomment this to allow local users to log in.
local_enable=YES
Uncomment this to enable any form of FTP write command.
write_enable=NO
Default umask for local users is 077. You may wish to change this to 022,
if your users expect that (022 is used by most other ftpd’s)
#local_umask=022
Uncomment this to allow the anonymous FTP user to upload files. This only
has an effect if the above global write enable is activated. Also, you will
obviously need to create a directory writable by the FTP user.
#anon_upload_enable=YES
Uncomment this if you want the anonymous FTP user to be able to create
new directories.
#anon_mkdir_write_enable=YES
Activate directory messages - messages given to remote users when they
go into a certain directory.
dirmessage_enable=YES
If enabled, vsftpd will display directory listings with the time
in your local time zone. The default is to display GMT. The
times returned by the MDTM FTP command are also affected by this
option.
use_localtime=YES
Activate logging of uploads/downloads.
xferlog_enable=YES
Make sure PORT transfer connections originate from port 20 (ftp-data).
connect_from_port_20=YES
If you want, you can arrange for uploaded anonymous files to be owned by
a different user. Note! Using “root” for uploaded files is not
recommended!
#chown_uploads=YES
#chown_username=whoever
You may override where the log file goes if you like. The default is shown
below.
#xferlog_file=/var/log/vsftpd.log
If you want, you can have your log file in standard ftpd xferlog format.
Note that the default log file location is /var/log/xferlog in this case.
#xferlog_std_format=YES
You may change the default value for timing out an idle session.
#idle_session_timeout=600
You may change the default value for timing out a data connection.
#data_connection_timeout=120
It is recommended that you define on your system a unique user which the
ftp server can use as a totally isolated and unprivileged user.
#nopriv_user=ftpsecure
Enable this and the server will recognise asynchronous ABOR requests. Not
recommended for security (the code is non-trivial). Not enabling it,
however, may confuse older FTP clients.
#async_abor_enable=YES
By default the server will pretend to allow ASCII mode but in fact ignore
the request. Turn on the below options to have the server actually do ASCII
mangling on files when in ASCII mode.
Beware that on some FTP servers, ASCII support allows a denial of service
attack (DoS) via the command “SIZE /big/file” in ASCII mode. vsftpd
predicted this attack and has always been safe, reporting the size of the
raw file.
ASCII mangling is a horrible feature of the protocol.
#ascii_upload_enable=YES
#ascii_download_enable=YES
You may fully customise the login banner string:
ftpd_banner=Bienvenuue sur le serveur FTP W33BOX
You may specify a file of disallowed anonymous e-mail addresses. Apparently
useful for combatting certain DoS attacks.
#deny_email_enable=YES
(default follows)
#banned_email_file=/etc/vsftpd.banned_emails
You may restrict local users to their home directories. See the FAQ for
the possible risks in this before using chroot_local_user or
chroot_list_enable below.
#chroot_local_user=YES
You may specify an explicit list of local users to chroot() to their home
directory. If chroot_local_user is YES, then this list becomes a list of
users to NOT chroot().
(Warning! chroot’ing can be very dangerous. If using chroot, make sure that
the user does not have write access to the top level directory within the
chroot)
#chroot_local_user=YES
#chroot_list_enable=YES
(default follows)
#chroot_list_file=/etc/vsftpd.chroot_list
You may activate the “-R” option to the builtin ls. This is disabled by
default to avoid remote users being able to cause excessive I/O on large
sites. However, some broken FTP clients such as “ncftp” and “mirror” assume
the presence of the “-R” option, so there is a strong case for enabling it.
#ls_recurse_enable=YES
Customization
Some of vsftpd’s settings don’t fit the filesystem layout by
default.
This option should be the name of a directory which is empty. Also, the
directory should not be writable by the ftp user. This directory is used
as a secure chroot() jail at times vsftpd does not require filesystem
access.
secure_chroot_dir=/var/run/vsftpd
This string is the name of the PAM service vsftpd will use.
pam_service_name=vsftpd
This option specifies the location of the RSA certificate to use for SSL
encrypted connections.
#rsa_cert_file=/etc/ssl/private/vsftpd.pem
chroot_local_user=YES
chroot_list_enable=YES
chroot_list_file=/etc/vsftpd/chroot.list
Options for SSL
encrypted connections.
ssl_enable=NO
allow_anon_ssl=NO
force_local_data_ssl=NO
force_local_logins_ssl=YES
require_ssl_reuse=NO # Certains clients FTP nécessitent cette ligne
ssl_tlsv1=YES
ssl_sslv2=YES
ssl_sslv3=YES
rsa_cert_file=/etc/ssl/private/vsftpd.cert.pem
rsa_private_key_file=/etc/ssl/private/vsftpd.key.pem
pasv_enable=YES
pasv_promiscuous=NO
pasv_min_port=40000
pasv_max_port=40100
pasv_address=w33box.com
pasv_addr_resolve=YES
port_promiscuous=NO
‘guest_enable’ est très important: cela active les utilisateurs virtuels!
‘guest_username’ fait correspondre tous les utilisateurs virtuels à
l’utilisateur ‘ftp’ que nous avons défini plus haut, et au home
correspondant: ‘/home/ftp/’.
guest_enable=YES
guest_username=ftp
On défini le nombre maximum de sessions à 200(les nouveaux clients recevront
un message du genre: “erreur: serveur occupé”).
On défini le nombre maximum de sessions par IP à 4
max_clients=200
max_per_ip=4
Activer la configuration per-user
user_config_dir=/etc/vsftpd/vsftpd_user_conf[/code]
Voici le log de VSFTPD :
[quote]Mon Mar 9 18:25:29 2015 [pid 4073] CONNECT: Client "XXX.XXX.XXX.XXX"
Mon Mar 9 18:25:29 2015 [pid 4072] [MON_USER] FAIL LOGIN: Client “XXX.XXX.XXX.XXX”[/quote]
Et ennfin le log auth :
[quote]Mar 9 18:25:29 vps90726 vsftpd: pam_userdb(vsftpd:auth): user_lookup: could not open database `/etc/vsftpd/login.db
’: No such file or directory
Mar 9 18:25:56 vps90726 sshd[4094]: Accepted password for root from 86.212.145.254 port 59300 ssh2
Mar 9 18:25:56 vps90726 sshd[4094]: pam_unix(sshd:session): session opened for user root by (uid=0)
Mar 9 18:25:56 vps90726 sshd[4094]: subsystem request for sftp by user root[/quote]
Je tiens à préciser que, de plus, le fichier /etc/vsftpd/login.db existe bel et bien…
Je ne comprend pas.
Merci par avance de votre aide