You can subscribe to this list here.
2001 |
Jan
(24) |
Feb
(632) |
Mar
(97) |
Apr
(98) |
May
(47) |
Jun
(27) |
Jul
(44) |
Aug
(49) |
Sep
(34) |
Oct
(49) |
Nov
(10) |
Dec
(60) |
---|---|---|---|---|---|---|---|---|---|---|---|---|
2002 |
Jan
(40) |
Feb
(68) |
Mar
(12) |
Apr
(20) |
May
(91) |
Jun
(110) |
Jul
(62) |
Aug
(43) |
Sep
(46) |
Oct
(79) |
Nov
(39) |
Dec
(64) |
2003 |
Jan
(50) |
Feb
(26) |
Mar
(62) |
Apr
(32) |
May
(54) |
Jun
(34) |
Jul
(29) |
Aug
(39) |
Sep
(58) |
Oct
(104) |
Nov
(19) |
Dec
(18) |
2004 |
Jan
(36) |
Feb
(24) |
Mar
(17) |
Apr
(47) |
May
(50) |
Jun
(45) |
Jul
(38) |
Aug
(54) |
Sep
(40) |
Oct
(18) |
Nov
(24) |
Dec
(24) |
2005 |
Jan
(33) |
Feb
(31) |
Mar
(38) |
Apr
(27) |
May
(17) |
Jun
(16) |
Jul
(23) |
Aug
(19) |
Sep
(14) |
Oct
(43) |
Nov
(2) |
Dec
(6) |
2006 |
Jan
(4) |
Feb
(14) |
Mar
(17) |
Apr
(5) |
May
(10) |
Jun
(9) |
Jul
|
Aug
(7) |
Sep
(10) |
Oct
(2) |
Nov
(18) |
Dec
(7) |
2007 |
Jan
(29) |
Feb
(8) |
Mar
(8) |
Apr
(6) |
May
(8) |
Jun
(4) |
Jul
(13) |
Aug
(10) |
Sep
(11) |
Oct
(19) |
Nov
(6) |
Dec
(1) |
2008 |
Jan
(4) |
Feb
(9) |
Mar
(9) |
Apr
(13) |
May
|
Jun
(2) |
Jul
(12) |
Aug
(5) |
Sep
(6) |
Oct
(15) |
Nov
(1) |
Dec
(1) |
2009 |
Jan
(3) |
Feb
(27) |
Mar
(5) |
Apr
(1) |
May
(55) |
Jun
(23) |
Jul
(4) |
Aug
(2) |
Sep
|
Oct
(2) |
Nov
(9) |
Dec
(2) |
2010 |
Jan
(3) |
Feb
(13) |
Mar
(2) |
Apr
(2) |
May
(25) |
Jun
(4) |
Jul
(5) |
Aug
|
Sep
(5) |
Oct
(2) |
Nov
|
Dec
(20) |
2011 |
Jan
|
Feb
(1) |
Mar
(2) |
Apr
(5) |
May
(7) |
Jun
(4) |
Jul
(3) |
Aug
(2) |
Sep
(1) |
Oct
(3) |
Nov
(10) |
Dec
(12) |
2012 |
Jan
(4) |
Feb
|
Mar
(9) |
Apr
|
May
(2) |
Jun
|
Jul
(1) |
Aug
(3) |
Sep
|
Oct
|
Nov
|
Dec
|
2013 |
Jan
(1) |
Feb
|
Mar
(10) |
Apr
(1) |
May
(1) |
Jun
(2) |
Jul
(8) |
Aug
|
Sep
(4) |
Oct
(1) |
Nov
(2) |
Dec
(3) |
2014 |
Jan
(3) |
Feb
|
Mar
|
Apr
(1) |
May
(7) |
Jun
(1) |
Jul
(2) |
Aug
|
Sep
|
Oct
|
Nov
(2) |
Dec
(2) |
2015 |
Jan
|
Feb
(2) |
Mar
|
Apr
(3) |
May
(7) |
Jun
(1) |
Jul
|
Aug
(2) |
Sep
|
Oct
(7) |
Nov
(2) |
Dec
|
2016 |
Jan
|
Feb
(1) |
Mar
(4) |
Apr
|
May
|
Jun
|
Jul
|
Aug
|
Sep
(10) |
Oct
|
Nov
(8) |
Dec
|
2017 |
Jan
(4) |
Feb
(9) |
Mar
(11) |
Apr
(9) |
May
|
Jun
|
Jul
|
Aug
(7) |
Sep
(1) |
Oct
|
Nov
|
Dec
|
2018 |
Jan
(2) |
Feb
|
Mar
|
Apr
|
May
|
Jun
|
Jul
(1) |
Aug
|
Sep
|
Oct
(2) |
Nov
|
Dec
(3) |
2019 |
Jan
|
Feb
|
Mar
|
Apr
|
May
|
Jun
|
Jul
(1) |
Aug
|
Sep
|
Oct
(4) |
Nov
|
Dec
|
2020 |
Jan
|
Feb
(2) |
Mar
|
Apr
|
May
(6) |
Jun
(1) |
Jul
(3) |
Aug
|
Sep
|
Oct
|
Nov
|
Dec
|
2021 |
Jan
|
Feb
|
Mar
|
Apr
|
May
(6) |
Jun
(2) |
Jul
|
Aug
(1) |
Sep
|
Oct
|
Nov
|
Dec
|
2022 |
Jan
|
Feb
|
Mar
(9) |
Apr
(2) |
May
(1) |
Jun
|
Jul
(2) |
Aug
|
Sep
|
Oct
|
Nov
(1) |
Dec
(2) |
2023 |
Jan
|
Feb
|
Mar
|
Apr
|
May
(2) |
Jun
(6) |
Jul
|
Aug
|
Sep
(4) |
Oct
(2) |
Nov
|
Dec
(2) |
From: TJ S. <tj...@ca...> - 2023-12-20 04:49:13
|
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hello, ProFTPD community. The ProFTPD Project team is happy to announce that the second maintenance release for ProFTPD 1.3.8 is now available for public consumption. You can download 1.3.8b, including PGP signatures and SHA256 sums, from GitHub: https://github.com/proftpd/proftpd/archive/v1.3.8b.tar.gz Alternatively, you can download proftpd from the main site: ftp://ftp.proftpd.org/distrib/source The 1.3.8b release is a maintenance release, containing various fixes backported from the 1.3.9 development cycle. Please read the included NEWS and RELEASE_NOTES files for the full details. The SHA256 sum for the source tarball is: 183ab7c6107de271a2959ff268f55c9b6c76b2cf0029e6584fccc019686601e0 proftpd-1.3.8b.tar.gz The PGP signature for the source tarball is: proftpd-1.3.8b.tar.gz: -----BEGIN PGP SIGNATURE----- Comment: GPGTools - https://gpgtools.org iEYEABECAAYFAmWCcGMACgkQt46JP6URl2rOOACgqd6poiniUeOej3gVoE4ZHA1Z PKgAoKgsyi9zqoilnOtZJKfzWw4BJ546 =GIJC -----END PGP SIGNATURE----- My PGP key has been used to sign the source tarballs as well as this announcement; it is available via MIT's public keyserver. -----BEGIN PGP SIGNATURE----- Comment: GPGTools - https://gpgtools.org iEYEARECAAYFAmWCcX8ACgkQt46JP6URl2r2YQCgz5CLfTFc5Wm8GLB5UZjCOlko unIAnjxvBt4hL/KPjnHp+vKaHTpALJz/ =JYci -----END PGP SIGNATURE----- |
From: TJ S. <tj...@ca...> - 2023-12-20 04:41:12
|
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hello, ProFTPD community. The ProFTPD Project team is pleased to announce that the second release candidate for ProFTPD 1.3.9 is now available for public consumption. You can download 1.3.9rc2, including PGP signature, from GitHub: https://github.com/proftpd/proftpd/archive/v1.3.9rc2.tar.gz Alternatively, you can download proftpd from the main site: ftp://ftp.proftpd.org/distrib/source The 1.3.9rc2 release includes security fixes, and other bugfixes, including: + Addressing "Terrapin" SSH attack (CVE-2023-48795) + Fixed builds for ChaChaPoly SSH support using older OpenSSL versions Please read the included NEWS and RELEASE_NOTES files for the full details. The SHA256 sum for the source tarball is: ffec3df8dc9f727203255b467bba9404b17b9ea3b61715ceb477c2417e081b76 proftpd-1.3.9rc2.tar.gz The PGP signature for the source tarball is: proftpd-1.3.9rc2.tar.gz: -----BEGIN PGP SIGNATURE----- Comment: GPGTools - https://gpgtools.org iEYEABECAAYFAmWCarIACgkQt46JP6URl2oNkgCfeyPsyKljSwK36TiTZu16wAGY ZG0AoPx8OnkjA5m4rz42qQxozY9B+MpK =bMjA -----END PGP SIGNATURE----- My PGP key has been used to sign the source tarballs as well as this announcement; it is available via MIT's public keyserver. -----BEGIN PGP SIGNATURE----- Comment: GPGTools - https://gpgtools.org iEYEARECAAYFAmWCbBgACgkQt46JP6URl2oLNQCgv4PS+58YzNJCWYVzizji5Tuk +xQAnRLPvYfgDtNe3c4gqkz1e7ct+kfp =Uxk+ -----END PGP SIGNATURE----- |
From: TJ S. <tj...@ca...> - 2023-10-09 00:00:45
|
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hello, ProFTPD community. The ProFTPD Project team is pleased to announce that the first maintenance release for ProFTPD 1.3.8 is now available for public consumption. You can download 1.3.8a, including PGP signatures and SHA256 sums, from GitHub: https://github.com/proftpd/proftpd/archive/v1.3.8a.tar.gz Alternatively, you can download proftpd from the main site: ftp://ftp.proftpd.org/distrib/source The 1.3.8a release is a maintenance release, containing various fixes backported from the 1.3.9 development cycle. Please read the included NEWS and RELEASE_NOTES files for the full details. The SHA256 sum for the source tarball is: 56093b890a712220b09b98e29de2974a590e8fae6b36ed78c698a90945466aaf proftpd-1.3.8a.tar.gz The PGP signature for the source tarball is: proftpd-1.3.8a.tar.gz: -----BEGIN PGP SIGNATURE----- Comment: GPGTools - https://gpgtools.org iEYEABECAAYFAmUjQZQACgkQt46JP6URl2qpFwCggqITzFB6fkGfBU5z0+AX3aGn EVgAnRC//qyIouovEZcf/STTg6CDAbMn =sgjA -----END PGP SIGNATURE----- My PGP key has been used to sign the source tarballs as well as this announcement; it is available via MIT's public keyserver. -----BEGIN PGP SIGNATURE----- Comment: GPGTools - https://gpgtools.org iEYEARECAAYFAmUjQckACgkQt46JP6URl2qK2wCg89VT/KA7bmSIROtuApa9GCaQ Do4An3BndI0II5LoGGEtpg6jbi0pH+Zs =Oemg -----END PGP SIGNATURE----- |
From: TJ S. <tj...@ca...> - 2023-10-08 23:40:05
|
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hello, ProFTPD community. The ProFTPD Project team is pleased to announce that the first release candidate for ProFTPD 1.3.9 is now available for public consumption. You can download 1.3.9rc1, including PGP signature, from GitHub: https://github.com/proftpd/proftpd/archive/v1.3.9rc1.tar.gz Alternatively, you can download proftpd from the main site: ftp://ftp.proftpd.org/distrib/source The 1.3.9rc1 release includes major new features and numerous bugfixes, including: + Support for the cha...@op... SSH cipher algorithm + Support for OpenSSh FIDO security keys + Fixed builds using OpenSSL 3.x + Improved file download speed Please read the included NEWS and RELEASE_NOTES files for the full details. The SHA256 sum for the source tarball is: 9d25e4ae7256df43753cb4e16f1e3946f379deb5cc32131765d97e60ed4c2464 proftpd-1.3.9rc1.tar.gz The PGP signature for the source tarball is: proftpd-1.3.9rc1.tar.gz: -----BEGIN PGP SIGNATURE----- Comment: GPGTools - https://gpgtools.org iEYEABECAAYFAmUjOdIACgkQt46JP6URl2pSBACg+GZ1+xXTCAEUW6XxRBQfRly4 9SgAoPyC3gUcgi+q/xNtdAGFO8L6HqZS =wKtt -----END PGP SIGNATURE----- My PGP key has been used to sign the source tarballs as well as this announcement; it is available via MIT's public keyserver. -----BEGIN PGP SIGNATURE----- Comment: GPGTools - https://gpgtools.org iEYEARECAAYFAmUjOi0ACgkQt46JP6URl2rCjQCg9MViaUvsminL/zTd9iifcQud 64UAn00/DWHhIi4EVQfRW8QJI8gv93XS =3lmV -----END PGP SIGNATURE----- |
From: TJ S. <tj...@ca...> - 2023-09-11 16:34:01
|
> For example, something like this might work for your use case: > > <IfModule mod_rewrite.c> > RewriteEngine on > RewriteLog /path/to/rewrite.log > > # Define a map that uses the internal "tolower" function > RewriteMap lowercase int:tolower > > RewriteCondition %m REWRITE_HOME > RewriteRule (.*) ${uppercase:$1} > </IfModule> Oops. I was copy/pasting this together from multiple different examples, and missed a spot; that's meant to be using "lowercase": <IfModule mod_rewrite.c> RewriteEngine on RewriteLog /path/to/rewrite.log # Define a map that uses the internal "tolower" function RewriteMap lowercase int:tolower RewriteCondition %m REWRITE_HOME RewriteRule (.*) ${lowercase:$1} </IfModule> Cheers, TJ |
From: TJ S. <tj...@ca...> - 2023-09-11 16:31:07
|
>> Going through some old emails, I ran across this. I've filed a GitHub issue for tracking this: >> >> https://github.com/proftpd/proftpd/issues/1716 > > Thank you. There is however another issue related to this. When I initially > implemented this, some users were unable to login, because their usernames > were internally stored as uppercase in the AD (while others were lowercase), > and ProFTPd was unable to find home directory for the user, because it > searched for "/home/USERNAME" while the actual directory was > "/home/username". It returned a failure and the user was unable to login. > So I needed also to introduce another patch (I don't have it at hand now, > since I don't work on that server anymore) that lowercases the username > before searching for home directory. You might be able to implement this now, without any patches, using the mod_rewrite module, and RewriteHome; see: http://www.proftpd.org/docs/modules/mod_auth.html#RewriteHome For example, something like this might work for your use case: <IfModule mod_rewrite.c> RewriteEngine on RewriteLog /path/to/rewrite.log # Define a map that uses the internal "tolower" function RewriteMap lowercase int:tolower RewriteCondition %m REWRITE_HOME RewriteRule (.*) ${uppercase:$1} </IfModule> Hope this helps, TJ |
From: Jaroslaw R. <ra...@ra...> - 2023-09-10 20:23:51
|
Dnia 10.09.2023 o godz. 10:49:18 TJ Saunders pisze: > > > recently I needed to configure ProFTPd to authenticate users in Microsoft AD > > domain. I think it's a well-known fact that AD LDAP directory by default > > does not contain any "uidNumber" and "gidNumber" (or equivalent) attribute. > > If you configure system-wide authentication to AD with sssd (according to > > many guides available on the net), it can use a special algorithm to map > > "objectSid" values present in the AD directory to UIDs and GIDs, therefore > > "producing" specific UID/GID values for each user. > > Going through some old emails, I ran across this. I've filed a GitHub issue for tracking this: > > https://github.com/proftpd/proftpd/issues/1716 Thank you. There is however another issue related to this. When I initially implemented this, some users were unable to login, because their usernames were internally stored as uppercase in the AD (while others were lowercase), and ProFTPd was unable to find home directory for the user, because it searched for "/home/USERNAME" while the actual directory was "/home/username". It returned a failure and the user was unable to login. So I needed also to introduce another patch (I don't have it at hand now, since I don't work on that server anymore) that lowercases the username before searching for home directory. I made this lowercasing mandatory, but of course there also can be a configuration setting controlling this. So while I don't have the actual patch right now, I kindly ask you to implement this. -- Regards, Jaroslaw Rafa ra...@ra... -- "In a million years, when kids go to school, they're gonna know: once there was a Hushpuppy, and she lived with her daddy in the Bathtub." |
From: TJ S. <tj...@ca...> - 2023-09-10 18:06:01
|
> recently I needed to configure ProFTPd to authenticate users in Microsoft AD > domain. I think it's a well-known fact that AD LDAP directory by default > does not contain any "uidNumber" and "gidNumber" (or equivalent) attribute. > If you configure system-wide authentication to AD with sssd (according to > many guides available on the net), it can use a special algorithm to map > "objectSid" values present in the AD directory to UIDs and GIDs, therefore > "producing" specific UID/GID values for each user. Going through some old emails, I ran across this. I've filed a GitHub issue for tracking this: https://github.com/proftpd/proftpd/issues/1716 Cheers, TJ |
From: TJ S. <tj...@ca...> - 2023-06-19 17:05:56
|
> If I install the postgresql15-server package, it automatically installs > the postgresql15-client as well. If after that I install > proftpd-mod_sql_postgresql, it uninstalls postgresql15-client, and > installs postgresql13-client instead. This causes all kinds of issues. > BTW I am using FreeBSD 13.1. Hrm. I see. Unfortunately this sounds like an issue with that FreeBSD package definition -- and I'm not sure who the current FreeBSD package maintainers are for ProFTPD. We don't provide packages ourselves, just source code releases. Perhaps someone else here might know how to contact the FreeBSD package maintainers for ProFTPD, to let them know of this issue? Cheers, TJ |
From: <ma...@pa...> - 2023-06-16 18:43:42
|
If I install the postgresql15-server package, it automatically installs the postgresql15-client as well. If after that I install proftpd-mod_sql_postgresql, it uninstalls postgresql15-client, and installs postgresql13-client instead. This causes all kinds of issues. BTW I am using FreeBSD 13.1. On 2023-06-16 13:28, TJ Saunders wrote: >> It seems that mod_sql_postgresql only works with Postgresql up to >> version 13. Is there a way to make it work with version 15? > > What are the issues you're seeing, when using Postgres 15? I'm not > currently aware of anything version-specific in the mod_sql_postgres > module. > > Cheers, > TJ > > > _______________________________________________ > ProFTPD Developers List > <pro...@pr...> > https://lists.sourceforge.net/lists/listinfo/proftp-devel |
From: TJ S. <tj...@ca...> - 2023-06-16 18:28:59
|
> It seems that mod_sql_postgresql only works with Postgresql up to > version 13. Is there a way to make it work with version 15? What are the issues you're seeing, when using Postgres 15? I'm not currently aware of anything version-specific in the mod_sql_postgres module. Cheers, TJ |
From: <ma...@pa...> - 2023-06-16 17:25:19
|
Hi. It seems that mod_sql_postgresql only works with Postgresql up to version 13. Is there a way to make it work with version 15? Thanks, Marc. |
From: Francesco P. L. <fr...@de...> - 2023-06-09 09:43:22
|
On Tue, Oct 09, 2018 at 10:39:25AM -0500, Jared Bents wrote: >I am working on a project that would like to use ftpquota and >ftpasswd. However, Perl is not allowed on the project by the Security >team. Just curious, what is the reason for that special veto? Note that Perl in 2023 is still a base package for any distro, and even a build-essential. Maybe the project is targeted to some type of embedded flavor built in cross-compiling? -- Francesco P. Lovergine |
From: Christian <ch...@co...> - 2023-06-01 07:14:35
|
Am 18.05.23 um 00:31 schrieb TJ Saunders: > The way it works is via the new ServerAlias directive: > > <VirtualHost 1.2.3.4> > Port 21 > ServerAlias myftphost.example.com > TLSEngine on > ... > </VirtualHost> > > <VirtualHost 1.2.3.4> > Port 21 > ServerAlias myotherftphost.example.com > TLSEngine on > ... > </VirtualHost> Thank you. Will try ... -- Christian ------------------------------------------------------------ https://join.worldcommunitygrid.org?recruiterId=177038 ------------------------------------------------------------ http://www.sc24.de - Sportbekleidung ------------------------------------------------------------ |
From: TJ S. <tj...@ca...> - 2023-05-17 22:50:58
|
> Just wondering if it is possible to have a per vhost SSL config, so each > vhost can have its own SSL certificate as it is possible with apache. > > Currently I don't see how this could be established. This should be possible, yes, especially using the latest 1.3.8 release. The way it works is via the new ServerAlias directive: <VirtualHost 1.2.3.4> Port 21 ServerAlias myftphost.example.com TLSEngine on ... </VirtualHost> <VirtualHost 1.2.3.4> Port 21 ServerAlias myotherftphost.example.com TLSEngine on ... </VirtualHost> If you use a DNS name for the <VirtualHost> line, rather than an IP address, ProFTPD automatically adds a "ServerAlias" setting for that name. With these, things should work as you expect. The FTPS-capable client _should_, in its TLS handshake, send the Server Name Indicator (SNI) field, whose name will match one of the named <VirtualHost> sections -- and mod_tls will notice this, and update/use all of that vhost certificates/keys, etc. Hope this helps, TJ |
From: Christian <ch...@co...> - 2023-05-09 09:20:26
|
Hi, using proftpd for a very long time now. Just wondering if it is possible to have a per vhost SSL config, so each vhost can have its own SSL certificate as it is possible with apache. Currently I don't see how this could be established. Thank you for your feedback -- Christian ------------------------------------------------------------ https://join.worldcommunitygrid.org?recruiterId=177038 ------------------------------------------------------------ http://www.sc24.de - Sportbekleidung ------------------------------------------------------------ |
From: TJ S. <tj...@ca...> - 2022-12-04 19:23:39
|
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hello, ProFTPD community. The ProFTPD Project team is pleased to announce that the final maintenance release for ProFTPD 1.3.7 is now available for public consumption. You can download 1.3.7f, including PGP signatures and SHA256 sums, from the alternate download site, hosted by GitHub: https://github.com/proftpd/proftpd/archive/v1.3.7f.tar.gz Alternatively, you can download proftpd from the main site: ftp://ftp.proftpd.org/distrib/source The 1.3.7f release is a maintenance release, containing various fixes backported from the 1.3.8 development cycle. Please read the included NEWS and ChangeLog files for the full details. The SHA256 sum for the source tarball is: 1177d11367fc2da5d7b5695d3ab0aec434f72e2ab02e154fa61a75a4b0689acf The PGP signature for the source tarball is: proftpd-1.3.7f.tar.gz: -----BEGIN PGP SIGNATURE----- Comment: GPGTools - https://gpgtools.org iEYEABECAAYFAmOM8XMACgkQt46JP6URl2p8JACgpdHitMp82z21CGXIX1YIyVTN KP4AoLXY5x07uLo+B8j6xXEQRIAUqH8S =RDRA -----END PGP SIGNATURE----- My PGP key has been used to sign the source tarballs as well as this announcement; it is available via MIT's public keyserver. -----BEGIN PGP SIGNATURE----- Comment: GPGTools - https://gpgtools.org iEYEARECAAYFAmOM8akACgkQt46JP6URl2pr/gCfcJi7Ootev4aFBd84BIjpzhnx E3gAn2JZZDPQ2iDk3oZ22GrsqnLnyBDK =ACPO -----END PGP SIGNATURE----- |
From: TJ S. <tj...@ca...> - 2022-12-04 19:04:15
|
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hello, ProFTPD community. The ProFTPD Project team is pleased to announce that the stable release for ProFTPD 1.3.8 is now available for public consumption. You can download 1.3.8, including PGP signatures and SHA256 sums, from the alternate download site, hosted by GitHub: https://github.com/proftpd/proftpd/archive/v1.3.8.tar.gz Alternatively, you can download proftpd from the main site: ftp://ftp.proftpd.org/distrib/source The 1.3.8 release includes bugfixes; read the included NEWS and RELEASE_NOTES files for the full details. The SHA256 sum for the source tarball is: f7139e7377a2cb059b8b9b14d76a6df5f440e3181cb15ae890d43bbcae574748 The PGP signature for the source tarball is: proftpd-1.3.8.tar.gz: -----BEGIN PGP SIGNATURE----- Comment: GPGTools - https://gpgtools.org iEYEABECAAYFAmOM6+gACgkQt46JP6URl2qa+ACeK4oy5IjE4ZkJB/eDSLlR8gcP qSYAnAv/q+jD4/XM3BgaxwJGSdISDssd =MhNZ -----END PGP SIGNATURE----- My PGP key has been used to sign the source tarballs as well as this announcement; it is available via MIT's public keyserver. -----BEGIN PGP SIGNATURE----- Comment: GPGTools - https://gpgtools.org iEYEARECAAYFAmOM7FYACgkQt46JP6URl2oqMgCgh3pSR36sLeIgj4KzrJ4hdar9 ll8AnjlC4ULZQgU2fMTCPr2Hvbyv0CFb =xhOm -----END PGP SIGNATURE----- |
From: TJ S. <tj...@ca...> - 2022-11-30 01:06:05
|
Hello, fellow ProFTPD developers. I'd like to ask you all if you run ProFTPD in Kubernetes (k8s), and if so, how? I ask because I'd like to work on a ProFTPD k8s howto doc, containing our combined lessons learned, dos and don'ts. I suspect that more and more sites will be looking to deploy FTP/FTPS/SFTP support alongside their other existing k8s applications, and I think we should help them do so. I'm thinking to cover things like: * ingresses (HAproxy? nginx? ProFTPD + mod_proxy?) * shared state across pods (Redis? Memcache? SQL?) * handling of active/passive data transfers (or maybe it's just passive only?) * metrics/observability (statsd, Prometheus, etc?) * logging Looking forward to hearing from folks! Cheers, TJ |
From: TJ S. <tj...@ca...> - 2022-07-23 20:49:46
|
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hello, ProFTPD community. The ProFTPD Project team is pleased to announce that the fifth maintenance release for ProFTPD 1.3.7 is now available for public consumption. You can download 1.3.7e, including PGP signatures and SHA256 sums, from the alternate download site, hosted by GitHub: https://github.com/proftpd/proftpd/archive/v1.3.7e.tar.gz Alternatively, you can download proftpd from the main site: ftp://ftp.proftpd.org/distrib/source The 1.3.7e release is a maintenance release, containing various fixes backported from the 1.3.8 development cycle. Please read the included NEWS and ChangeLog files for the full details. The SHA256 sum for the source tarball is: 6e716a3b53ee069290399fce6dccf4c229fafe6ec2cb14db3778b7aa3f9a8c92 The PGP signature for the source tarball is: proftpd-1.3.7e.tar.gz: -----BEGIN PGP SIGNATURE----- Comment: GPGTools - https://gpgtools.org iEYEABECAAYFAmLcXGgACgkQt46JP6URl2qkGQCgk8hkXYGEmTJ/kw9+ffP1Ep6z /i0An0b9pWXxzVKyg3Wz9CydgZt5n0tw =4bRy -----END PGP SIGNATURE----- My PGP key has been used to sign the source tarballs as well as this announcement; it is available via MIT's public keyserver. -----BEGIN PGP SIGNATURE----- Comment: GPGTools - https://gpgtools.org iEYEARECAAYFAmLcXYsACgkQt46JP6URl2oVPgCeOUH/isMmvLx2pqZhSoUhUOjg fmQAoOQhHg486AOtuM5RIZvFJFaoyPKE =WTte -----END PGP SIGNATURE----- |
From: TJ S. <tj...@ca...> - 2022-07-23 20:29:47
|
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hello, ProFTPD community. The ProFTPD Project team is pleased to announce that the fourth release candidate for ProFTPD 1.3.8 is now available for public consumption. You can download 1.3.8rc4, including PGP signatures and SHA256 sums, from the alternate download site, hosted by GitHub: https://github.com/proftpd/proftpd/archive/v1.3.8rc4.tar.gz Alternatively, you can download proftpd from the main site: ftp://ftp.proftpd.org/distrib/source The 1.3.8rc4 release includes a number of issues and features, including: + Support for OpenSSL 3.x. + Use SFTPClientMatch for tuning more SSH algorithms per client type Please read the included NEWS and RELEASE_NOTES files for the full details. The SHA256 sum for the source tarball is: 63a91b2fb7a9ab1409f6ae315e90e2efefea8c98e00ada9b8d97b0fadb2abe5e The PGP signature for the source tarball is: proftpd-1.3.8rc4.tar.gz: -----BEGIN PGP SIGNATURE----- iEYEABECAAYFAmLcVdkACgkQt46JP6URl2rjVACfY162JNg6cDZb8gkEEswVtkiR BMoAnAnkFq1uJsFXJwNqL6wKtA7iqj98 =7P47 -----END PGP SIGNATURE----- My PGP key has been used to sign the source tarballs as well as this announcement; it is available via MIT's public keyserver. -----BEGIN PGP SIGNATURE----- Comment: GPGTools - https://gpgtools.org iEYEARECAAYFAmLcV8IACgkQt46JP6URl2q+NACeKjbkYe2nm4X+bdPtY1q5ai6O lAQAni3XWGl40TQQHVn9vUqwlu7XDElR =dMR2 -----END PGP SIGNATURE----- |
From: Jaroslaw R. <ra...@ra...> - 2022-05-25 22:22:03
|
Hello, recently I needed to configure ProFTPd to authenticate users in Microsoft AD domain. I think it's a well-known fact that AD LDAP directory by default does not contain any "uidNumber" and "gidNumber" (or equivalent) attribute. If you configure system-wide authentication to AD with sssd (according to many guides available on the net), it can use a special algorithm to map "objectSid" values present in the AD directory to UIDs and GIDs, therefore "producing" specific UID/GID values for each user. However, ProFTPd's mod_ldap module cannot use this information and therefore one needs to force all users logging in via AD to the same LDAPDefaultUID and LDAPDefaultGID values. This is not always acceptable. In my case, I needed the users logging in via FTP to have the same UID/GID values as the ones provided to them via sssd when logging in interactively (otherwise they wouldn't be able to write to their home directories!). I wonder that nobody has written nowhere about this obvious (and very common) problem and didn't suggest any solution for it. Therefore I created a simple patch to mod_ldap.c, allowing to use a special value "auto" for LDAPDefaultUID or LDAPDefaultGID directive in config file (actually the value "auto" is internally converted to UID/GID equal to -2, so one can obtain the same result specifying -2 as the value for LDAPDefaultUID/LDAPDefaultGID). If LDAPDefaultUID or LDAPDefaultGID is set to "auto", the correct value of UID or GID is obtained via getpwnam() call from the username. This is enough to make use of the mapping provided by sssd. The patch is enclosed. It is a patch against the current version on Github (it should work also with 1.3.7d), although I haven't tested it with that version. My ProFTPd is version 1.3.4a, so I initially patched mod_ldap distributed with that version, which is a bit different. But the patch is so simple that I hope I have changed it properly for the new version :). I don't know what is the correct way to submit this for considering to be included in the distribution, so I'm simply sending the patch for your use in whatever way appropriate. -- Regards, Jaroslaw Rafa ra...@ra... -- "In a million years, when kids go to school, they're gonna know: once there was a Hushpuppy, and she lived with her daddy in the Bathtub." |
From: TJ S. <tj...@ca...> - 2022-04-23 21:48:50
|
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hello, ProFTPD community. The ProFTPD Project team is pleased to announce that the third release candidate for ProFTPD 1.3.8 is now available for public consumption. You can download 1.3.8rc3, including PGP signatures and SHA256 sums, from the alternate download site, hosted by GitHub: https://github.com/proftpd/proftpd/archive/v1.3.8rc3.tar.gz Alternatively, you can download proftpd from the main site: ftp://ftp.proftpd.org/distrib/source The 1.3.8rc3 release fixes a number of issues and features, including: + Support for OpenSSH GCM ciphers, Encrypt-Then-MAC (ETM) digests + Support for the newer PCRE2 library for regular expressions * Improved consistency/support for name-based virtual hosts Please read the included NEWS and RELEASE_NOTES files for the full details. The SHA256 sum for the source tarball is: 563e70dd701cf717f50f7ab18d255e51e621bf3014c6d9bb3b8bf546801b316d The PGP signature for the source tarball is: proftpd-1.3.8rc3.tar.gz: -----BEGIN PGP SIGNATURE----- iEYEABECAAYFAmJkcOoACgkQt46JP6URl2pHsgCfa2Wt03HmvZfMJmUJMkpxuWHY pWIAnR6G/iHocp9bM7nFfwJQutHWQr0Y =0tQT -----END PGP SIGNATURE----- My PGP key has been used to sign the source tarballs as well as this announcement; it is available via MIT's public keyserver. -----BEGIN PGP SIGNATURE----- Comment: GPGTools - https://gpgtools.org iEYEARECAAYFAmJkcTkACgkQt46JP6URl2qvTACdHiAB99mHOF2p6rUe4BVMnULS 2WsAnR0TcBlHojQhjHE2F5LdxCBeAmg9 =h/h/ -----END PGP SIGNATURE----- |
From: TJ S. <tj...@ca...> - 2022-04-23 21:40:52
|
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hello, ProFTPD community. The ProFTPD Project team is pleased to announce that the fourth maintenance release for ProFTPD 1.3.7 is now available for public consumption. You can download 1.3.7d, including PGP signatures and SHA256 sums, from the alternate download site, hosted by GitHub: https://github.com/proftpd/proftpd/archive/v1.3.7c.tar.gz Alternatively, you can download proftpd from the main site: ftp://ftp.proftpd.org/distrib/source The 1.3.7d release is a maintenance release, containing various fixes backported from the 1.3.7 development cycle. Please read the included NEWS and ChangeLog files for the full details. The SHA256 sum for the source tarball is: b231536e2978116801d06278e805b18e5240568d2bc921693ac7147652e267e4 The PGP signature for the source tarball is: proftpd-1.3.7d.tar.gz: -----BEGIN PGP SIGNATURE----- iEYEABECAAYFAmJkaOAACgkQt46JP6URl2rpQQCg3lxen9FlGhhfqfC1d8WRDWR1 jZAAniCCGqXvg/CDJP2SBpEAhrePE+MS =DBc2 -----END PGP SIGNATURE----- My PGP key has been used to sign the source tarballs as well as this announcement; it is available via MIT's public keyserver. -----BEGIN PGP SIGNATURE----- Comment: GPGTools - https://gpgtools.org iEYEARECAAYFAmJkbhUACgkQt46JP6URl2qHGQCfWAUSwJR3g7yd3kfFPq6pjEyU +qUAniUVeCx16ghfqJ3Emz8LtoVB3HK4 =FI/c -----END PGP SIGNATURE----- |
From: TJ S. <tj...@ca...> - 2022-03-26 15:48:35
|
> any news on this ? So far, the only way I've been able to reproduce the reported behavior locally is when I've added the "--disable-static" configure option to my builds -- and then my local build fails in a similar manner. I don't often use that particular configure option, since the ProFTPD build doesn't really build static libraries -- except for its own base static library. You might try removing that "--disable-static" from the configure command in your .spec file, see if that helps? Cheers, TJ |