How To Configure vsftpd for a User’s Directory on an Ubuntu 18.04 VPS or Dedicated Server

How To Configure vsftpd for a User’s Directory on an Ubuntu 18.04 VPS or Dedicated Server

Introduction

Vsftpd short of Very Secure File Transfer Protocol Daemon is a secure FTP (File Transfer Protocol) for Ubuntu systems. FTP is the most commonly used standard network protocol for downloading and uploading files between two computers in a given network.

By default, FTP data is insecure because critical information such as usernames, data, passwords, etc. is normally transmitted unencrypted in plain text. Therefore, it is important to ensure the FTP connections are encrypted using vsftpd.

In this tutorial, we will show you how to configure vsftpd with SSL/TLS support on Ubuntu 18.04 VPS.

Prerequisites

Before you begin, make sure you have the following:

  • A non-root user with sudo privileges.
  • A VPS or dedicated server running on Ubuntu 18.04
  • A configured static IP address.

Step 1 – Installing vsftpd

To start off, update the packages and install vsftpd daemon by running the commands below:

$ sudo apt update
$ sudo apt install vsftpd

Once the file is installed, check the vsftpd status using the following command:

$ sudo service vsftpd status

Let’s now copy the current configuration file and create an original backup for it before configuring the firewall:

$ sudo cp /etc/vsftpd.conf /etc/vsftpd.conf.orig

Step 2 – Configuring Firewall

Start by checking whether the firewall is enabled. But before that, make sure you allow SSH traffic otherwise the firewall may block these tests.

Now check the status of the firewall. Press y then Enter if warned about altering the SSH connection.

$ sudo ufw status

If the firewall is working properly, you should get a Status: active message and the firewall rules will be automatically added:

Status: active
To                         Action      From
--                         ------      ----
OpenSSH                    ALLOW       Anywhere
OpenSSH (v6)               ALLOW       Anywhere (v6)

Now, go ahead and open the ports 20 and 21 for FTP, including ports 40000-50000 for passive FTP. Also, open port 990 to enable TLS which we will set up later:

$ sudo ufw allow 20/tcp
$ sudo ufw allow 21/tcp
$ sudo ufw allow 990/tcp
$ sudo ufw allow 40000:50000/tcp
$ sudo ufw status

Once the process is complete, the firewall rules output should look like this:

Status: active
To                         Action      From
--                         ------      ----
OpenSSH                    ALLOW       Anywhere
990/tcp                    ALLOW       Anywhere
20/tcp                     ALLOW       Anywhere
21/tcp                     ALLOW       Anywhere
40000:50000/tcp            ALLOW       Anywhere
OpenSSH (v6)               ALLOW       Anywhere (v6)
20/tcp (v6)                ALLOW       Anywhere (v6)
21/tcp (v6)                ALLOW       Anywhere (v6)
990/tcp (v6)               ALLOW       Anywhere (v6)
40000:50000/tcp (v6)       ALLOW       Anywhere (v6)

Having installed vsftpd and after ensuring the required ports are open, we can proceed to create an FTP user.

Step 3 – Creating FTP User

Let’s create a new user for FTP. Make sure you add a test user. In our example, we will call our new user ftpuser.

$ sudo adduser ftpuser

Create a strong password for it. You will be prompted to enter some key information, then press ENTER for each case.

For FTP to be more secure to users, it should be directed to a certain directory. Vsftpd can achieve this using chroot. Enabling chroot for users restricts them to a specific home directory. But, since vsftpd ensures the home directory is safe, it shouldn’t be writable by the local user.

In this tutorial, instead of getting rid of the write privileges in the home directory, we shall create a new ftp directory in place of chroot and a corresponding writable files directory for the original files.

To create a new ftp folder, run the following command:

$ sudo mkdir /home/ftpuser/ftp

Create an ownership file to the ftp directory to nobody:nogroup:

$ sudo chown nobody:nogroup /home/ftpuser/ftp

Do away with the write permissions:

$ sudo chmod a-w /home/ftpuser/ftp

Now, verify these permissions:

$ sudo ls -la /home/ftpuser/ftp

This will give you an output like the one below

total 8
4 dr-xr-xr-x  2 nobodynogroup 4096 Aug 24 21:29 .
4 drwxr-xr-x  3 ftpuser  ftpuser   4096 Aug 24 21:29 ..

The next step is to create a new directory to store uploads and ensure they are assigned to the local user:

$ sudo mkdir /home/ftpuser/ftp/files
$ sudo chown ftpuser:ftpuser /home/ftpuser/ftp/files

Now, run the command below to check the permission on ftp directory:

$ sudo ls -la /home/ftpuser/ftp

This will give you the following output:

total 12
dr-xr-xr-x 3 nobodynogroup 4096 Aug 26 14:01 .
drwxr-xr-x 3 ftpuser  ftpuser   4096 Aug 26 13:59 ..
drwxr-xr-x 2 ftpuser  ftpuser   4096 Aug 26 14:01 files

Now, add another file test.txt for test purpose:

$echo"vsftpd test file" | sudo tee /home/ftpuser/ftp/files/test.txt

Once the ftp directory is secure and the the files directory is accessible by the user, go ahead and configure FTP.

Step 4 – Configuring FTP -vsftpd Access

The major settings to allow one single user to connect with FTP are already made in vsftpd.conf. Create a backup file before editing the config file.

$ sudo cp /etc/vsftpd.conf /etc/vsftpd.conf.bak

Now, open the config file to confirm that the configuration settings you have match the following:

$ sudo nano /etc/vsftpd.conf

You should see the output below:

. . .
# Allow anonymous FTP? (Disabled by default).
anonymous_enable=NO
#
# Uncomment this to allow local users to login.
local_enable=YES
. . .

Now, you need to allow the FTP users to upload files to the server by uncommenting the setting labelled write_enable in the directory /etc/vsftpd.conf.

. . .
write_enable=YES
. . .

Now, go ahead and edit the chroot to make sure the FTP users have no access to any files apart from those in the directory /etc/vsftpd.conf:

. . .
chroot_local_user=YES
. . .

Add a user_sub_token line to include a username in the local_root directory to ensure the configuration process works for the local user and any other users in future. Add the following settings in the file /etc/vsftpd.conf:

. . .
user_sub_token=$USER
local_root=/home/$USER/ftp

Also, let’s add the ports limit range for passive FTP to ensure there are enough connections available:

. . .
pasv_min_port=40000
pasv_max_port=50000

Note that we opened these ports in Step 2 to setup the port range for passive FTP. In case of any changes made to these values, ensure you update the firewall settings.

To make sure that users can access FTP only when they are on the list, and not by default, let’s set the following configuration in the directory /etc/vsftpd.conf:

. . .
userlist_enable=YES
userlist_file=/etc/vsftpd.userlist
userlist_deny=NO

From the configuration above, if userlist_deny is set to YES, it means that the users added on the list will not gain FTP access. If it is set to NO, the only users allowed access are those on the list.

Once you have done these changes, save your file and exit.

Now, add the user to /etc/vsftpd.userlist. Make sure you use the -a flag attached to the file:

$echo"ftpuser" | sudo tee -a /etc/vsftpd.userlist

Check to ensure that the file has been added:

$ cat /etc/vsftpd.userlist

This will deliver the output below:

ftpuser

Lastly, restart the vsftpd daemon to apply these changes:

$ sudo systemctl restart vsftpd

Once you have the configuration set, now test the FTP access.

Step 5 – Testing FTP Access

Now that you have successfully configured your server to allow the ftpuser to connect through FTP, we need to ensure this process works properly.

Start by trying whether anonymous can gain access to the system. If the configuration is working as planned, non-users should not access the system.

$ ftp -p (IP address)

The output should look like this:

Connected to IP address.
220 (vsFTPd 3.0.3)
Name (IP address:default): anonymous
530 Permission denied.
ftp: Login failed.
Ftp

Now close the connections:

ftp>bye

Next, try to connect as a sudo user. Other users other than ftpuser should be denied permission before they even enter their password.

$ ftp -p IP address

The output should look like this:

Connected to IP address.
220 (vsFTPd 3.0.3)
Name (IP address:default): sudo_user
530 Permission denied.
ftp: Login failed.
ftp>

Now, close the connection:

ftp>bye

Next, the ftp user should connect, read, and even write files. We need to ensure that our user finds it’s easy to connect:

$ ftp -p IP address

The output should look like this:

Connected to IP address.
220 (vsFTPd 3.0.3)
Name (IP address:default): ftpuser
331Please specify the password.
Password: your_user's_password
230Login successful.
Remote system type is UNIX.
Using binary mode to transfer files.
ftp>

Now, change to the files directory and transfer the files created earlier to your computer using the get command:

ftp>cd files
ftp> get test.txt

The output should look like this:

227EnteringPassiveMode (IP address).
150OpeningBINARY mode data connection for test.txt (16 bytes).
226Transfer complete.
16 bytes received in0.0101 seconds (1588 bytes/s)
ftp>

Now, let’s test the write permissions by uploading our file in the directory with a new name:

ftp> puttest.txtupload.txt

The output should look like this:

227EnteringPassiveMode (IP address).
150Ok to send data.
226Transfer complete.
16 bytes sent in0.000894 seconds (17897 bytes/s)

Now, close the connections:

ftp>bye

Having tested the configuration, let’s secure the server.

Step 6 – Securing The Transactions

FTP doesn’t encrypt data including the user’s credentials. So, we will activate TLS/SSL to get an encryption. Start by creating an SSL certificate for vsftpd.

To do so, we will use OpenSSL for the certificate and include the -days line to acquire one-year validity. We will also include a private key on this command to have the certificate and the key in one file:

$ sudo openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout /etc/ssl/private/vsftpd.pem -out /etc/ssl/private/vsftpd.pem

You will be asked to provide more details for the certificate. Use your information on the highlighted areas in the display below:

Generating a 2048 bit RSA private key
............................................................................+++
...........+++
writing newprivate key to '/etc/ssl/private/vsftpd.pem'
-----
You are about to be asked to enter information that will be incorporated
into your certificate request.
What you are about to enter is what is called a Distinguished Name or a DN.
There are quite a few fields but you can leave some blank
For some fields there will be a default value,
If you enter '.', the field will be left blank.
-----
Country Name (2 letter code) [AU]:US
State or Province Name (full name) [Some-State]:NY
Locality Name (eg, city) []:New York City
Organization Name (eg, company) [Internet Widgits Pty Ltd]:HostAdvice
Organizational Unit Name (eg, section) []:
Common Name (e.g. server FQDN or YOUR name) []: your_server_ip
Email Address []:

Once the certificates are ready, go to the vsftpd configuration file and open it again:

$ sudo nano /etc/vsftpd.conf

At the bottom are two lines starting with RSA. Edit them so that you have something like this:

. . .
# rsa_cert_file=/etc/ssl/certs/ssl-cert-snakeoil.pem
# rsa_private_key_file=/etc/ssl/private/ssl-cert-snakeoil.key
. . .

On the next line in the same directory (/etc/vsftpd.conf), add the following information:

. . .
rsa_cert_file=/etc/ssl/private/vsftpd.pem
rsa_private_key_file=/etc/ssl/private/vsftpd.pem
. . .

The next thing is to ensure SSL is working to prevent TLS users from gaining access. This is important to make sure all the traffic is fully encrypted. However, this move may force the FTP user to change clients.

Go ahead and change ssl enable to YES

/etc/vsftpd.conf

. . .
ssl_enable=YES
. . .

Edit and add these lines to deny anonymous access over SSL:

/etc/vsftpd.conf

. . .
allow_anon_ssl=NO
force_local_data_ssl=YES
force_local_logins_ssl=YES
. . .

Now, add the following lines to configure your server to use TLS:

/etc/vsftpd.conf

. . .
ssl_tlsv1=YES
ssl_sslv2=NO
ssl_sslv3=NO
. . .

Lastly, we will include two extra options. We will need high encrypted cipher suites meaning that the key lengths will be 128 bits or more:

/etc/vsftpd.conf

. . .
require_ssl_reuse=NO
ssl_ciphers=HIGH
. . .

The output will look like this:

/etc/vsftpd.conf

# This option specifies the location of the RSA certificate to use for SSL
# encrypted connections.
#rsa_cert_file=/etc/ssl/certs/ssl-cert-snakeoil.pem
#rsa_private_key_file=/etc/ssl/private/ssl-cert-snakeoil.key
rsa_cert_file=/etc/ssl/private/vsftpd.pem
rsa_private_key_file=/etc/ssl/private/vsftpd.pem
ssl_enable=YES
allow_anon_ssl=NO
force_local_data_ssl=YES
force_local_logins_ssl=YES
ssl_tlsv1=YES
ssl_sslv2=NO
ssl_sslv3=NO
require_ssl_reuse=NO
ssl_ciphers=HIGH

When everything is complete, save and exit the file.

Now restart the system to apply these changes:

$ sudo systemctl restart vsftpd

The next step is to verify that it is possible to connect to the server with a client supporting TLS.

Step 7 – Testing TLS Using FileZilla

To test TLS we shall use FileZilla since it offers a cross-platform support service.

When you’re inside FileZilla, locate the Site Manager and click on it.

On the new window, press the New Site button.

Go to My Sites icon where you will see another icon labeled New Site. Use the Rename button to assign a new name to your site.

Enter your name or IP address in the Host field. Go to Encryption and choose Require explicit FTP over TLS.

For the Login Type section, select Ask for password. Enter your FTP user in the next section labeled User field.

Press the Connect and enter your password.

Press OK to start the connection. Now, you should be automatically be connected to the server using TLS/SSL encryption.

If everything worked out properly, you will see a server certificate display as shown below:

After accepting the certificate, go to the files folder and double click on it, then drag upload.txt to the left side to ensure you can easily download the files.

Now, rename the copy to upload-tls.txt then transfer it back to the server to see if your can successfully upload files.

If the process is successful, it shows you can transfers files using SSL/TLS enable successfully.

Conclusion

Congratulations! You can comfortably set up FTP for different users on Ubuntu 18.04 VPS. Over to you.

Check out these top 3 Linux hosting services

FastComet
$1.79 /mo
Starting price
Visit FastComet
Rating based on expert review
  • User Friendly
    4.7
  • Support
    5.0
  • Features
    4.8
  • Reliability
    4.5
  • Pricing
    5.0
Kamatera
$4.00 /mo
Starting price
Visit Kamatera
Rating based on expert review
  • User Friendly
    3.5
  • Support
    3.0
  • Features
    3.9
  • Reliability
    4.0
  • Pricing
    4.3
HostArmada
$2.49 /mo
Starting price
Visit HostArmada
Rating based on expert review
  • User Friendly
    4.5
  • Support
    4.5
  • Features
    4.5
  • Reliability
    4.5
  • Pricing
    4.0

How To Set up a VSFTPD Server on a CentOS 7 VPS or Dedicated Server

Brief Description FTP is usually insecure exposing clear-text passwords, userna
2 min read
Avi Ilinsky
Avi Ilinsky
Hosting Expert

How to Install and Configure vsftpd on Ubuntu 18.04

A guide on installing and configuring vsftpd including setting up encryption
2 min read
Max Ostryzhko
Max Ostryzhko
Senior Web Developer, HostAdvice CTO

How To Install VSFTPD on Ubuntu 18.04

A guide on installing and configuring vsftpd including setting up encryption
2 min read
Yuriy Gandyak
Yuriy Gandyak
Senior Writer & Hosting Expert

How To Install VSFTPD on Ubuntu 18.04

This article focuses on configuring SSL/TLS for already installed VSFTPD in Ubun
2 min read
Max Ostryzhko
Max Ostryzhko
Senior Web Developer, HostAdvice CTO
HostAdvice.com provides professional web hosting reviews fully independent of any other entity. Our reviews are unbiased, honest, and apply the same evaluation standards to all those reviewed. While monetary compensation is received from a few of the companies listed on this site, compensation of services and products have no influence on the direction or conclusions of our reviews. Nor does the compensation influence our rankings for certain host companies. This compensation covers account purchasing costs, testing costs and royalties paid to reviewers.
Click to go to the top of the page
Go To Top