You can subscribe to this list here.
| 2001 |
Jan
|
Feb
|
Mar
|
Apr
|
May
|
Jun
|
Jul
|
Aug
|
Sep
|
Oct
(356) |
Nov
(380) |
Dec
(318) |
|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2002 |
Jan
(439) |
Feb
(396) |
Mar
(326) |
Apr
(364) |
May
(331) |
Jun
(300) |
Jul
(345) |
Aug
(367) |
Sep
(567) |
Oct
(690) |
Nov
(454) |
Dec
(328) |
| 2003 |
Jan
(507) |
Feb
(507) |
Mar
(556) |
Apr
(482) |
May
(529) |
Jun
(528) |
Jul
(534) |
Aug
(271) |
Sep
(333) |
Oct
(348) |
Nov
(340) |
Dec
(241) |
| 2004 |
Jan
(319) |
Feb
(331) |
Mar
(283) |
Apr
(259) |
May
(172) |
Jun
(212) |
Jul
(186) |
Aug
(264) |
Sep
(201) |
Oct
(138) |
Nov
(136) |
Dec
(107) |
| 2005 |
Jan
(130) |
Feb
(154) |
Mar
(116) |
Apr
(79) |
May
(123) |
Jun
(151) |
Jul
(65) |
Aug
(121) |
Sep
(113) |
Oct
(109) |
Nov
(134) |
Dec
(78) |
| 2006 |
Jan
(26) |
Feb
(83) |
Mar
(150) |
Apr
(83) |
May
(145) |
Jun
(80) |
Jul
(102) |
Aug
(99) |
Sep
(93) |
Oct
(26) |
Nov
(39) |
Dec
(46) |
| 2007 |
Jan
(78) |
Feb
(65) |
Mar
(77) |
Apr
(39) |
May
(63) |
Jun
(59) |
Jul
(53) |
Aug
(50) |
Sep
(93) |
Oct
(85) |
Nov
(35) |
Dec
(22) |
| 2008 |
Jan
(56) |
Feb
(26) |
Mar
(58) |
Apr
(45) |
May
(52) |
Jun
(52) |
Jul
(41) |
Aug
(34) |
Sep
(27) |
Oct
(75) |
Nov
(31) |
Dec
(69) |
| 2009 |
Jan
(54) |
Feb
(55) |
Mar
(57) |
Apr
(39) |
May
(40) |
Jun
(79) |
Jul
(49) |
Aug
(30) |
Sep
(46) |
Oct
(72) |
Nov
(89) |
Dec
(71) |
| 2010 |
Jan
(48) |
Feb
(73) |
Mar
(52) |
Apr
(28) |
May
(32) |
Jun
(48) |
Jul
(29) |
Aug
(38) |
Sep
(14) |
Oct
(32) |
Nov
(70) |
Dec
(46) |
| 2011 |
Jan
(33) |
Feb
(30) |
Mar
(79) |
Apr
(24) |
May
(29) |
Jun
(63) |
Jul
(22) |
Aug
(38) |
Sep
(27) |
Oct
(49) |
Nov
(41) |
Dec
(69) |
| 2012 |
Jan
(28) |
Feb
(21) |
Mar
(18) |
Apr
(50) |
May
(30) |
Jun
(16) |
Jul
(22) |
Aug
(15) |
Sep
(35) |
Oct
(37) |
Nov
(23) |
Dec
(19) |
| 2013 |
Jan
(40) |
Feb
(76) |
Mar
(18) |
Apr
(17) |
May
(27) |
Jun
(17) |
Jul
(67) |
Aug
(30) |
Sep
(27) |
Oct
(43) |
Nov
(13) |
Dec
(13) |
| 2014 |
Jan
(37) |
Feb
(36) |
Mar
(31) |
Apr
(3) |
May
(40) |
Jun
(20) |
Jul
(18) |
Aug
(23) |
Sep
(15) |
Oct
(28) |
Nov
(26) |
Dec
(20) |
| 2015 |
Jan
(10) |
Feb
(16) |
Mar
(8) |
Apr
(11) |
May
(6) |
Jun
(8) |
Jul
(6) |
Aug
(12) |
Sep
(4) |
Oct
(26) |
Nov
(13) |
Dec
(6) |
| 2016 |
Jan
(30) |
Feb
(19) |
Mar
(12) |
Apr
(15) |
May
(3) |
Jun
(20) |
Jul
|
Aug
(19) |
Sep
(17) |
Oct
(7) |
Nov
(15) |
Dec
(33) |
| 2017 |
Jan
(19) |
Feb
(18) |
Mar
(25) |
Apr
(25) |
May
(10) |
Jun
(2) |
Jul
(5) |
Aug
(9) |
Sep
|
Oct
(5) |
Nov
(18) |
Dec
(4) |
| 2018 |
Jan
(17) |
Feb
(14) |
Mar
(4) |
Apr
(8) |
May
(9) |
Jun
(9) |
Jul
(12) |
Aug
(26) |
Sep
(10) |
Oct
(2) |
Nov
(6) |
Dec
(2) |
| 2019 |
Jan
(4) |
Feb
(2) |
Mar
(4) |
Apr
(2) |
May
(16) |
Jun
(2) |
Jul
(5) |
Aug
(16) |
Sep
(13) |
Oct
(16) |
Nov
(7) |
Dec
(18) |
| 2020 |
Jan
(4) |
Feb
(6) |
Mar
(9) |
Apr
(21) |
May
(33) |
Jun
(15) |
Jul
(12) |
Aug
(2) |
Sep
(9) |
Oct
(2) |
Nov
(17) |
Dec
(9) |
| 2021 |
Jan
(16) |
Feb
(21) |
Mar
(8) |
Apr
(5) |
May
(4) |
Jun
(10) |
Jul
(13) |
Aug
(12) |
Sep
|
Oct
|
Nov
(5) |
Dec
(6) |
| 2022 |
Jan
(9) |
Feb
(3) |
Mar
(18) |
Apr
(7) |
May
(4) |
Jun
(5) |
Jul
(10) |
Aug
(4) |
Sep
(4) |
Oct
(2) |
Nov
(6) |
Dec
(8) |
| 2023 |
Jan
(3) |
Feb
(4) |
Mar
(24) |
Apr
(13) |
May
(1) |
Jun
|
Jul
(21) |
Aug
(1) |
Sep
(10) |
Oct
(5) |
Nov
|
Dec
(2) |
| 2024 |
Jan
(9) |
Feb
|
Mar
(1) |
Apr
|
May
(5) |
Jun
|
Jul
(1) |
Aug
(13) |
Sep
(5) |
Oct
(2) |
Nov
(9) |
Dec
(1) |
| 2025 |
Jan
(3) |
Feb
(12) |
Mar
(1) |
Apr
|
May
|
Jun
(5) |
Jul
(13) |
Aug
(8) |
Sep
|
Oct
(3) |
Nov
(4) |
Dec
(4) |
| 2026 |
Jan
|
Feb
|
Mar
(10) |
Apr
(11) |
May
(2) |
Jun
|
Jul
|
Aug
|
Sep
|
Oct
|
Nov
|
Dec
|
|
From: Dieter B. <pr...@bl...> - 2026-05-01 13:24:34
|
Hi, On Fri, May 01, Preuße, Hilmar via Proftp-user wrote: > Am 30.04.2026 um 17:54 schrieb TJ Saunders: > > Hello, > > > When developing that patch to use the newer, non-deprecated APIs, I > > verified locally against a MySQL database, using libmysqlclient, but > > did not think to try using libmariadb and a MariaDB. This > > difference in behavior makes me wonder what the libmariadb > > implementations, old and new, might look like. I would have > > expected that configuring the trusted CAs would (and should) have > > been required from the beginning, regardless of the internal API > > change in 1.3.9a. > > > Thanks for explanation. So, what I understand it is quite unsure, why it > happened now not earlier. Anyway I'll drop a note in the debian/NEWS file > just any case anybody else runs into the issue. The OP did not mention a > MariaDB change or something. there was no change in the environment. So it looks to me like the commit TJ mentioned caused the unexpected behavior. Till version 1.3.9 I didn't have to add the "ssl-ca:/etc/ssl/certs" phrase to SQLConnectInfo -- Regards Dieter -- I do not get viruses because I do not use MS software. If you use Outlook then please do not put my email address in your address-book so that WHEN you get a virus it won't use my address in the From field. |
|
From: Preuße, H. <hi...@we...> - 2026-05-01 11:15:50
|
Am 30.04.2026 um 17:54 schrieb TJ Saunders: Hello, > When developing that patch to use the newer, non-deprecated APIs, I > verified locally against a MySQL database, using libmysqlclient, but > did not think to try using libmariadb and a MariaDB. This > difference in behavior makes me wonder what the libmariadb > implementations, old and new, might look like. I would have > expected that configuring the trusted CAs would (and should) have > been required from the beginning, regardless of the internal API > change in 1.3.9a. > Thanks for explanation. So, what I understand it is quite unsure, why it happened now not earlier. Anyway I'll drop a note in the debian/NEWS file just any case anybody else runs into the issue. The OP did not mention a MariaDB change or something. Hilmar |
|
From: TJ S. <tj...@ca...> - 2026-04-30 15:54:36
|
>> >> There was a change to the mod_sql_mysql implementation with regards to configuring the client side TLS setup, for connecting via TLS to a MySQL/MariaDB; see: >> >> >> >> https://github.com/proftpd/proftpd/issues/340 >> >> https://github.com/proftpd/proftpd/commit/89becd5eee7dc857580addd71459655cc59d507b >> >> >> >> However, there was no intended change of user-visible behavior; the goal was simply to use the newer API provided by the client library in order to maintain the same TLS behavior. >> >> >> >> I'll try to reproduce the behavior you're seeing locally, try to narrow down what might be happening. >> > >> > Thank you for the hint. >> > After I added ssl-ca:/etc/ssl/certs to the SQLConnectInfo line, >> > the mysql connection is encrypted and I can login to the mariadb. >> > >> > Thank you very much for the link to the commit >> > >> >> Is that new in proftp 1.3.9a in comparison to 1.3.9? I.e. should I >> mention that in the NEWS file? >> >> Thanks, >> Hilmar > > I kind of have to chip in now, because: > > - this was already the case in 1.3.9 and I think even in some late > 1.3.8x version (I may be wrong on the last one) > - this is not MariaDB-exclusive, I have had that with an Percona XtraDB > cluster as well Correct. Support for configuring the TLS setup in the SQLConnectInfo directive has been present since ProFTPD 1.3.6rc2; see: http://bugs.proftpd.org/show_bug.cgi?id=4200 What changed between 1.3.9 and 1.3.9a here is the internal MySQL/MariaDB client library API used to configure that TLS support, when connecting to the database. I don't know why the original reporter's existing configuration worked, but did not after updating to 1.3.9a; that suggests that the client library used itself had some implementation differences. When developing that patch to use the newer, non-deprecated APIs, I verified locally against a MySQL database, using libmysqlclient, but did not think to try using libmariadb and a MariaDB. This difference in behavior makes me wonder what the libmariadb implementations, old and new, might look like. I would have expected that configuring the trusted CAs would (and should) have been required from the beginning, regardless of the internal API change in 1.3.9a. Cheers, TJ |
|
From: Malte S. <m...@ma...> - 2026-04-30 12:47:15
|
Am Donnerstag, April 30, 2026 14:39 CEST, schrieb Preuße, Hilmar via Proftp-user <pro...@li...>: > Am 29.04.2026 um 07:39 schrieb Dieter Bloms via Proftp-user: > > On Tue, Apr 28, TJ Saunders wrote: > > Hello, > > >> There was a change to the mod_sql_mysql implementation with regards to configuring the client side TLS setup, for connecting via TLS to a MySQL/MariaDB; see: > >> > >> https://github.com/proftpd/proftpd/issues/340 > >> https://github.com/proftpd/proftpd/commit/89becd5eee7dc857580addd71459655cc59d507b > >> > >> However, there was no intended change of user-visible behavior; the goal was simply to use the newer API provided by the client library in order to maintain the same TLS behavior. > >> > >> I'll try to reproduce the behavior you're seeing locally, try to narrow down what might be happening. > > > > Thank you for the hint. > > After I added ssl-ca:/etc/ssl/certs to the SQLConnectInfo line, > > the mysql connection is encrypted and I can login to the mariadb. > > > > Thank you very much for the link to the commit > > > > Is that new in proftp 1.3.9a in comparison to 1.3.9? I.e. should I > mention that in the NEWS file? > > Thanks, > Hilmar I kind of have to chip in now, because: - this was already the case in 1.3.9 and I think even in some late 1.3.8x version (I may be wrong on the last one) - this is not MariaDB-exclusive, I have had that with an Percona XtraDB cluster as well Best regards, M |
|
From: Preuße, H. <hi...@we...> - 2026-04-30 12:39:31
|
Am 29.04.2026 um 07:39 schrieb Dieter Bloms via Proftp-user: > On Tue, Apr 28, TJ Saunders wrote: Hello, >> There was a change to the mod_sql_mysql implementation with regards to configuring the client side TLS setup, for connecting via TLS to a MySQL/MariaDB; see: >> >> https://github.com/proftpd/proftpd/issues/340 >> https://github.com/proftpd/proftpd/commit/89becd5eee7dc857580addd71459655cc59d507b >> >> However, there was no intended change of user-visible behavior; the goal was simply to use the newer API provided by the client library in order to maintain the same TLS behavior. >> >> I'll try to reproduce the behavior you're seeing locally, try to narrow down what might be happening. > > Thank you for the hint. > After I added ssl-ca:/etc/ssl/certs to the SQLConnectInfo line, > the mysql connection is encrypted and I can login to the mariadb. > > Thank you very much for the link to the commit > Is that new in proftp 1.3.9a in comparison to 1.3.9? I.e. should I mention that in the NEWS file? Thanks, Hilmar |
|
From: Dieter B. <pr...@bl...> - 2026-04-29 05:39:31
|
Hello, On Tue, Apr 28, TJ Saunders wrote: > > I run the proftpd 1.3.9 with a mariadb backend. > > In the database I force the use of ssl for mysql connection. > > > > After an update to version 1.3.9a the user can't login to the datebase > > anymore. > > > > When I disable SSL on database (ALTER USER loginuser@'%' require none), > > then proftpd can login with the version 1.3.9a. > > > > Is there a new parameter I have to the in the proftpd config file > > There was a change to the mod_sql_mysql implementation with regards to configuring the client side TLS setup, for connecting via TLS to a MySQL/MariaDB; see: > > https://github.com/proftpd/proftpd/issues/340 > https://github.com/proftpd/proftpd/commit/89becd5eee7dc857580addd71459655cc59d507b > > However, there was no intended change of user-visible behavior; the goal was simply to use the newer API provided by the client library in order to maintain the same TLS behavior. > > I'll try to reproduce the behavior you're seeing locally, try to narrow down what might be happening. Thank you for the hint. After I added ssl-ca:/etc/ssl/certs to the SQLConnectInfo line, the mysql connection is encrypted and I can login to the mariadb. Thank you very much for the link to the commit -- Regards Dieter -- I do not get viruses because I do not use MS software. If you use Outlook then please do not put my email address in your address-book so that WHEN you get a virus it won't use my address in the >From field. |
|
From: TJ S. <tj...@ca...> - 2026-04-28 17:06:22
|
> I run the proftpd 1.3.9 with a mariadb backend. > In the database I force the use of ssl for mysql connection. > > After an update to version 1.3.9a the user can't login to the datebase > anymore. > > When I disable SSL on database (ALTER USER loginuser@'%' require none), > then proftpd can login with the version 1.3.9a. > > Is there a new parameter I have to the in the proftpd config file Hmm. This is unexpected. There was a change to the mod_sql_mysql implementation with regards to configuring the client side TLS setup, for connecting via TLS to a MySQL/MariaDB; see: https://github.com/proftpd/proftpd/issues/340 https://github.com/proftpd/proftpd/commit/89becd5eee7dc857580addd71459655cc59d507b However, there was no intended change of user-visible behavior; the goal was simply to use the newer API provided by the client library in order to maintain the same TLS behavior. I'll try to reproduce the behavior you're seeing locally, try to narrow down what might be happening. Cheers, TJ |
|
From: Dieter B. <pr...@bl...> - 2026-04-28 12:50:56
|
Hello,
I run the proftpd 1.3.9 with a mariadb backend.
In the database I force the use of ssl for mysql connection.
After an update to version 1.3.9a the user can't login to the datebase
anymore.
When I disable SSL on database (ALTER USER loginuser@'%' require none),
then proftpd can login with the version 1.3.9a.
Is there a new parameter I have to the in the proftpd config file
proftpd is compiled as follow:
--snip--
# proftpd -V
Compile-time Settings:
Version: 1.3.9a (maint)
Platform: LINUX [Linux 5.14.0-687.el9.x86_64 x86_64]
OS/Release:
PRETTY_NAME="Debian GNU/Linux 12 (bookworm)"
NAME="Debian GNU/Linux"
VERSION_ID="12"
VERSION="12 (bookworm)"
VERSION_CODENAME=bookworm
ID=debian
Built: Di Apr 28 2026 08:45:13 CEST
Built With:
configure '--prefix=/usr' '--sbindir=/usr/sbin' '--sysconfdir=/etc' '--localstatedir=/var/lib/proftpd' '--mandir=/usr/share/man' '--disable-sendfile' '--disable-devel' '--disable-auth-pam' '--disable-ident' '--disable-ncurses' '--enable-timeout-idle=3600' '--enable-timeout-no-transfer=3600' '--enable-openssl' '--enable-nls' '--with-modules=mod_sftp:mod_quotatab:mod_quotatab_file:mod_sql:mod_sql_mysql:mod_quotatab_sql:mod_sftp_sql:mod_tls:mod_site_misc:mod_readme:mod_rewrite:mod_exec' 'CFLAGS=-g -O2 -fdebug-prefix-map=/tmp=. -fstack-protector-strong -Wformat -Werror=format-security' 'LDFLAGS=-Wl,-z,relro -Wl,-z,now' 'CPPFLAGS=-Wdate-time -D_FORTIFY_SOURCE=2' 'CXXFLAGS=-g -O2 -fdebug-prefix-map=/tmp=. -fstack-protector-strong -Wformat -Werror=format-security'
CFLAGS: -g2 -g -O2 -fdebug-prefix-map=/tmp=. -fstack-protector-strong -Wformat -Werror=format-security -Wall -fno-omit-frame-pointer -fno-strict-aliasing
LDFLAGS: -Wl,-L$(top_srcdir)/lib,-L$(top_builddir)/lib -Wl,-z,relro -Wl,-z,now -rdynamic -L/usr/lib/x86_64-linux-gnu/
LIBS: -lssl -lcrypto -lsodium -lssl -lm -lmysqlclient -lz -lcrypto -lcrypt -pthread
Files:
Configuration File:
/etc/proftpd.conf
Pid File:
/var/lib/proftpd/proftpd.pid
Scoreboard File:
/var/lib/proftpd/proftpd.scoreboard
Info:
+ Max supported UID: 4294967295
+ Max supported GID: 4294967295
Features:
- Autoshadow support
- Controls support
- curses support
- Developer support
- DSO support
+ IPv6 support
+ Largefile support
- Lastlog support
- Memcache support
- ncurses support
+ NLS support
+ OpenSSL support (OpenSSL 3.0.19 27 Jan 2026)
- PCRE support
- PCRE2 support
- POSIX ACL support
- Redis support
- Sendfile support
+ Shadow file support
+ Sodium support
+ Trace support
+ xattr support
Tunable Options:
PR_TUNABLE_BUFFER_SIZE = 1024
PR_TUNABLE_DEFAULT_RCVBUFSZ = 65536
PR_TUNABLE_DEFAULT_SNDBUFSZ = 65536
PR_TUNABLE_ENV_MAX = 2048
PR_TUNABLE_GLOBBING_MAX_MATCHES = 100000
PR_TUNABLE_GLOBBING_MAX_RECURSION = 8
PR_TUNABLE_HASH_TABLE_SIZE = 40
PR_TUNABLE_LOGIN_MAX = 256
PR_TUNABLE_NEW_POOL_SIZE = 512
PR_TUNABLE_PATH_MAX = 4096
PR_TUNABLE_SCOREBOARD_BUFFER_SIZE = 80
PR_TUNABLE_SCOREBOARD_SCRUB_TIMER = 30
PR_TUNABLE_SELECT_TIMEOUT = 30
PR_TUNABLE_TIMEOUTIDENT = 10
PR_TUNABLE_TIMEOUTIDLE = 3600
PR_TUNABLE_TIMEOUTLINGER = 10
PR_TUNABLE_TIMEOUTLOGIN = 300
PR_TUNABLE_TIMEOUTNOXFER = 3600
PR_TUNABLE_TIMEOUTSTALLED = 3600
PR_TUNABLE_XFER_SCOREBOARD_UPDATES = 10
--snip--
--
Regards
Dieter
--
I do not get viruses because I do not use MS software.
If you use Outlook then please do not put my email address in your
address-book so that WHEN you get a virus it won't use my address in the
>From field.
|
|
From: TJ S. <tj...@ca...> - 2026-04-27 23:37:49
|
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hello, ProFTPD community. The ProFTPD Project team is pleased to announce that the first maintenance release for ProFTPD 1.3.9 is now available for public consumption. You can download 1.3.9a, including PGP signatures and SHA256 sums, from GitHub: https://github.com/proftpd/proftpd/archive/v1.3.9a.tar.gz Alternatively, you can download proftpd from the main site: ftp://ftp.proftpd.org/distrib/source The 1.3.9a release is a maintenance release, containing various fixes backported from the 1.3.10 development cycle. Please read the included NEWS and RELEASE_NOTES files for the full details. The SHA256 sum for the source tarball is: bc3c7c47033ecff29f010efc18315d5906eb942d2e673ebce0138a96f11af0b4 proftpd-1.3.9a.tar.gz The PGP signature for the source tarball is: proftpd-1.3.9a.tar.gz: -----BEGIN PGP SIGNATURE----- iF0EABECAB0WIQRpfmhNFmjWloQoQFy3jok/pRGXagUCae/wrgAKCRC3jok/pRGX anVRAKC7DksemDuVm42kjbTW3LasjeGrBgCgjBdq78O4fBUem1bZgsQ6doxurzs= =d4O2 -----END PGP SIGNATURE----- My PGP key has been used to sign the source tarballs as well as this announcement; it is available via MIT's public keyserver. -----BEGIN PGP SIGNATURE----- iF0EARECAB0WIQRpfmhNFmjWloQoQFy3jok/pRGXagUCae/w/gAKCRC3jok/pRGX avpZAJ9Ic84fGSWoUOgjGWgPwg1G90+HIQCg52nhQwdw0/73TEEkrPbnfZkqP8M= =f8iS -----END PGP SIGNATURE----- |
|
From: TJ S. <tj...@ca...> - 2026-04-27 23:35:02
|
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hello, ProFTPD community. The ProFTPD Project team is pleased to announce that the first release candidate for ProFTPD 1.3.10 is now available for public consumption. You can download 1.3.10rc1, including PGP signature, from GitHub: https://github.com/proftpd/proftpd/archive/v1.3.10rc1.tar.gz Alternatively, you can download proftpd from the main site: ftp://ftp.proftpd.org/distrib/source The 1.3.10rc1 release includes major new features and numerous bugfixes, including: + Fix for SQL injection (CVE-2026-42167) + Disable Nagle algorithm for FTP data transfers + New mod_systemd module for richer systemd interaction Please read the included NEWS and RELEASE_NOTES files for the full details. The SHA256 sum for the source tarball is: 90e32076f175467771b3fd76e8de83b7692d76118f1db3328635866b74bb3785 proftpd-1.3.10rc1.tar.gz The PGP signature for the source tarball is: proftpd-1.3.10rc1.tar.gz: -----BEGIN PGP SIGNATURE----- iF0EABECAB0WIQRpfmhNFmjWloQoQFy3jok/pRGXagUCae/prwAKCRC3jok/pRGX ak1nAKDCRaI8ma9hsMzXzJgXanHwzTjpWQCgwWgB98MprWssK/W1egRdi2yjDBQ= =RNUQ -----END PGP SIGNATURE----- My PGP key has been used to sign the source tarballs as well as this announcement; it is available via MIT's public keyserver. -----BEGIN PGP SIGNATURE----- iF0EARECAB0WIQRpfmhNFmjWloQoQFy3jok/pRGXagUCae/qEwAKCRC3jok/pRGX alRcAKD+27IHT/eKsvu2vuA2+/lisDwcNwCfVDFi0JZShRhWY0ojGk4u0FsvPzE= =B1V7 -----END PGP SIGNATURE----- |
|
From: <m...@ma...> - 2026-04-07 19:04:14
|
Hi TJ and core team, I have reached out 2 times on the GitHub Issue tracker and once a couple months ago via mail, to offer my help to the project and update that very project infrastructure to modern standards. If moving things to GitHub makes it better/easier, then I guess why not. Though sometimes there is actually useful information on the forums of old software projects such as ProFTPd, especially for legacy setups that get updated only now or later in time. I would recommend to keep the forums and an archive-version of the website running, on an updated software stack. I understand this requires infrastructure, which I believe some companies are happy to provide to open source projects pro bono. If this is not wanted, at least I would somehow archive the data (maybe involving archiveteam.org?) for historical reference. It appears to me that FTP/FTPS/SFTP is far from dead and we will have to deal with it on an enterprise scale for at least 20 more years (who knows...). Glad to see some movement here. Let me know what I can do, I would like to support the project. From the other mails I see there are people wanting to step in. Would be great to organize a little! Best regards -----Ursprüngliche Nachricht----- Von: William David Edwards via Proftp-user <pro...@li...> Gesendet: Dienstag, 7. April 2026 19:40 An: pro...@li...; tj...@ca... Cc: William David Edwards <wed...@cy...>; ProFTPD Developers <pro...@li...> Betreff: Re: [Proftpd-user] Aging state of ProFTPD Project infrastructure Hi TJ, TJ Saunders schreef op 2026-04-07 19:25: > As many of you are aware, the state of the ProFTPD Project's > infrastructure is in desperate need of maintenance/upgrading. The VMs > which host the project's website, Bugzilla instance, forums, FTP > downloads, etc are all quite old -- this is why, for example, the > website, Bugzilla, forums currently do not have great HTTPS support. > (The underlying VM image has an OpenSSL package which predates > TLSv1.2, among other things.) > > These VMs are currently running in a provider's network, which has > been quite generous in allowing these to run. However, that provider > has gone through different company acquisitions; the fact that the VMs > are still running is, honestly, more by luck than by intention. Now, > the current company has indicated that these VMs _will_ be shut down > by September of this year, if not sooner. > > I know that maintaining infrastructure, in my spare time, is not very > appealing -- I have to do it too much already for my day job. No > excuses, just commenting on why nothing really has been done on this > front. But now we have a forcing function. > > The project core team has discussed this situation. Right now, we are > leaning toward shutting down the website, Bugzilla, and forums, and > relying on the existing GitHub repo for most needs. Most bug > reports/issues are already filed there, and there have been no > significant forums postings for more than a year now. Most modern > browsers are unhappy about the plain HTTP website, and update the lack > of TLSv1.2 certificates for the forums. > > This all demonstrates that GitHub meets most of the project needs with > regard to infrastructure. It also means fewer moving parts for future > maintainers of the project to maintain, going forward. > > With this in mind, I'd like to solicit your thoughts/feedback on what > sort of things you'd want to see in the GitHub repo (if anything), > knowing that these changes are coming. Feel free to respond to me > personally if you prefer. > > I don't have any particular dates/times when we'll shut those VMs down > (other than before September), but it'll be happening this year, one > way or another. > I think it makes perfect sense to move downloads & bug tracker to GitHub. I do however believe that having a website is still very useful for a mature project. The same case could be made for forums, having multiple potential communication channels for interaction with other users. People may not want to sign up to GitHub. If you need a VM to that purpose, feel free to give us - a hosting company from Europe - a shout off-list. > Cheers, > TJ > > > _______________________________________________ > ProFTPD Users List <pro...@pr...> > Unsubscribe problems? > http://www.proftpd.org/list-unsub.html Met vriendelijke groeten, William David Edwards _______________________________________________ ProFTPD Users List <pro...@pr...> Unsubscribe problems? http://www.proftpd.org/list-unsub.html |
|
From: William D. E. <wed...@cy...> - 2026-04-07 18:05:15
|
Hi TJ, TJ Saunders schreef op 2026-04-07 19:25: > As many of you are aware, the state of the ProFTPD Project's > infrastructure is in desperate need of maintenance/upgrading. The VMs > which host the project's website, Bugzilla instance, forums, FTP > downloads, etc are all quite old -- this is why, for example, the > website, Bugzilla, forums currently do not have great HTTPS support. > (The underlying VM image has an OpenSSL package which predates TLSv1.2, > among other things.) > > These VMs are currently running in a provider's network, which has been > quite generous in allowing these to run. However, that provider has > gone through different company acquisitions; the fact that the VMs are > still running is, honestly, more by luck than by intention. Now, the > current company has indicated that these VMs _will_ be shut down by > September of this year, if not sooner. > > I know that maintaining infrastructure, in my spare time, is not very > appealing -- I have to do it too much already for my day job. No > excuses, just commenting on why nothing really has been done on this > front. But now we have a forcing function. > > The project core team has discussed this situation. Right now, we are > leaning toward shutting down the website, Bugzilla, and forums, and > relying on the existing GitHub repo for most needs. Most bug > reports/issues are already filed there, and there have been no > significant forums postings for more than a year now. Most modern > browsers are unhappy about the plain HTTP website, and update the lack > of TLSv1.2 certificates for the forums. > > This all demonstrates that GitHub meets most of the project needs with > regard to infrastructure. It also means fewer moving parts for future > maintainers of the project to maintain, going forward. > > With this in mind, I'd like to solicit your thoughts/feedback on what > sort of things you'd want to see in the GitHub repo (if anything), > knowing that these changes are coming. Feel free to respond to me > personally if you prefer. > > I don't have any particular dates/times when we'll shut those VMs down > (other than before September), but it'll be happening this year, one > way or another. > I think it makes perfect sense to move downloads & bug tracker to GitHub. I do however believe that having a website is still very useful for a mature project. The same case could be made for forums, having multiple potential communication channels for interaction with other users. People may not want to sign up to GitHub. If you need a VM to that purpose, feel free to give us - a hosting company from Europe - a shout off-list. > Cheers, > TJ > > > _______________________________________________ > ProFTPD Users List <pro...@pr...> > Unsubscribe problems? > http://www.proftpd.org/list-unsub.html Met vriendelijke groeten, William David Edwards |
|
From: TJ S. <tj...@ca...> - 2026-04-07 17:26:27
|
As many of you are aware, the state of the ProFTPD Project's infrastructure is in desperate need of maintenance/upgrading. The VMs which host the project's website, Bugzilla instance, forums, FTP downloads, etc are all quite old -- this is why, for example, the website, Bugzilla, forums currently do not have great HTTPS support. (The underlying VM image has an OpenSSL package which predates TLSv1.2, among other things.) These VMs are currently running in a provider's network, which has been quite generous in allowing these to run. However, that provider has gone through different company acquisitions; the fact that the VMs are still running is, honestly, more by luck than by intention. Now, the current company has indicated that these VMs _will_ be shut down by September of this year, if not sooner. I know that maintaining infrastructure, in my spare time, is not very appealing -- I have to do it too much already for my day job. No excuses, just commenting on why nothing really has been done on this front. But now we have a forcing function. The project core team has discussed this situation. Right now, we are leaning toward shutting down the website, Bugzilla, and forums, and relying on the existing GitHub repo for most needs. Most bug reports/issues are already filed there, and there have been no significant forums postings for more than a year now. Most modern browsers are unhappy about the plain HTTP website, and update the lack of TLSv1.2 certificates for the forums. This all demonstrates that GitHub meets most of the project needs with regard to infrastructure. It also means fewer moving parts for future maintainers of the project to maintain, going forward. With this in mind, I'd like to solicit your thoughts/feedback on what sort of things you'd want to see in the GitHub repo (if anything), knowing that these changes are coming. Feel free to respond to me personally if you prefer. I don't have any particular dates/times when we'll shut those VMs down (other than before September), but it'll be happening this year, one way or another. Cheers, TJ |
|
From: Matus U. - f. <uh...@fa...> - 2026-03-21 17:56:24
|
>> So, it has to be owned by the running user, or at readable it we relax the >> permission check: >> >> SFTPOptions InsecureHostKeyPerms >> SFTPHostKey /etc/proftpd/ssh_host_rsa_key >> >> It works although complains in log as well: >> >> Mar 20 15:54:37 server proftpd[175306]: Checking syntax of >> configuration file >> Mar 20 15:54:37 server proftpd[175306]: 2026-03-20 15:54:37,411 server >> proftpd[175306]: mod_sftp/1.1.1: unable to use >> '/etc/proftpd/ssh_host_rsa_key' as host key, as it is group- or >> world-accessible On 21.03.26 10:30, TJ Saunders wrote: > Even with "SFTPOptions InsecureHostKeyPerms", I wanted to log something, at > config parse time, so that admins would be aware of the insecure > permissions on those files. Perhaps that is overkill? At the very least, > I will change the log level from NOTICE to INFO (perhaps DEBUG?), and > change the wording to be more accurate, as "unable to use" when, in fact, > the key _is_ used is wrong. That makes sense, thanks for explanation. -- Matus UHLAR - fantomas, uh...@fa... ; http://www.fantomas.sk/ Warning: I wish NOT to receive e-mail advertising to this address. Varovanie: na tuto adresu chcem NEDOSTAVAT akukolvek reklamnu postu. Remember half the people you know are below average. |
|
From: TJ S. <tj...@ca...> - 2026-03-21 17:31:18
|
> So, it has to be owned by the running user, or at readable it we relax the > permission check: > > SFTPOptions InsecureHostKeyPerms > SFTPHostKey /etc/proftpd/ssh_host_rsa_key > > It works although complains in log as well: > > Mar 20 15:54:37 server proftpd[175306]: Checking syntax of > configuration file > Mar 20 15:54:37 server proftpd[175306]: 2026-03-20 15:54:37,411 server > proftpd[175306]: mod_sftp/1.1.1: unable to use > '/etc/proftpd/ssh_host_rsa_key' as host key, as it is group- or > world-accessible Even with "SFTPOptions InsecureHostKeyPerms", I wanted to log something, at config parse time, so that admins would be aware of the insecure permissions on those files. Perhaps that is overkill? At the very least, I will change the log level from NOTICE to INFO (perhaps DEBUG?), and change the wording to be more accurate, as "unable to use" when, in fact, the key _is_ used is wrong. Cheers, TJ |
|
From: Matus U. - f. <uh...@fa...> - 2026-03-20 16:05:42
|
Of course I forgot: - SFTPHostKey must be readable by unauthorized user as well. So, it has to be owned by the running user, or at readable it we relax the permission check: SFTPOptions InsecureHostKeyPerms SFTPHostKey /etc/proftpd/ssh_host_rsa_key It works although complains in log as well: Mar 20 15:54:37 server proftpd[175306]: Checking syntax of configuration file Mar 20 15:54:37 server proftpd[175306]: 2026-03-20 15:54:37,411 server proftpd[175306]: mod_sftp/1.1.1: unable to use '/etc/proftpd/ssh_host_rsa_key' as host key, as it is group- or world-accessible Mar 20 15:54:37 server proftpd[175308]: 2026-03-20 15:54:37,433 server proftpd[175308]: mod_sftp/1.1.1: unable to use '/etc/proftpd/ssh_host_rsa_key' as host key, as it is group- or world-accessible Mar 20 15:54:37 server systemd[1]: Started proftpd.service - ProFTPD FTP Server. Perhaps we could have "RelaxedHostKeyPerms" option? On 20.03.26 16:33, Matus UHLAR - fantomas wrote: >It did help, I'd like to add a few points: > >- mod_vroot can be used to simulate chroot when not running proftpd as root > You can enable is using: > > LoadModule mod_vroot.c > VRootEngine on > and by using DefaultRoot directive. > >Link: http://www.castaglia.org/proftpd/modules/mod_vroot.html >(btw: why can't I find this module in proftpd.org?) > > >- init/rc script or systemd unit can be modified to execute proftpd >under given user instead of (or in affition to) using User and Group >directives > (works here) > >- having log directory (e.g. /var/log/proftpd) and run directory (e.g. >/run/proftpd) writable by proftpd makes it easier to fullfill writable >requirements for: > > PidFile > ScoreboardFile > DelayTable TransferLog SystemLog > ServerLog > SFTPLog > > and others. >- logrotate script should be changed to create log file(s) as configured user > ...or not create the file and let proftpd do that > >- systemd unit must be configured to use pid file configured above > >- use: > > AuthOrder mod_auth_file.c* > > to skip system authentication > (not sure if the * is required, but shouldn't hurt) > > >- In case of using virtual hosts, many of directives should be either >repeated in <VirtualHost> or placed into <Global> secion, because > of how Proftpd's virtual hosts work. > > This applies to directives mentioned above or in referenced document > http://www.proftpd.org/docs/howto/Nonroot.html > > SystemLog > WtmpLog > TransferLog > AuthUserFile > AuthGroupFile > AuthPAM > AuthOrder > VRootEngine > DefaultRoot > ...and all other directives applicable in <VirtualHost> anf ><Global> context. -- Matus UHLAR - fantomas, uh...@fa... ; http://www.fantomas.sk/ Warning: I wish NOT to receive e-mail advertising to this address. Varovanie: na tuto adresu chcem NEDOSTAVAT akukolvek reklamnu postu. Atheism is a non-prophet organization. |
|
From: Matus U. - f. <uh...@fa...> - 2026-03-20 15:33:29
|
>> Did anyone try to run ProFTPD completely under pon-privileged user? >> >> I guess It would need: >> >> - changing init script/systemd unit >> (directive User doesn't prevent from being able to setuid() etc) >> - using mod_vroot >> >> - listen on port>1024 >> - non-system user database (I guess even for single anonymous user) >> - setting paths/permissions for log, lock, pid files >> >> Does it need any changes more than that? >> Does it work? On 13.03.26 09:24, TJ Saunders wrote: >It can be done, yes -- depending on the desired configuration, of course. > This might help: > > http://www.proftpd.org/docs/howto/Nonroot.html It did help, I'd like to add a few points: - mod_vroot can be used to simulate chroot when not running proftpd as root You can enable is using: LoadModule mod_vroot.c VRootEngine on and by using DefaultRoot directive. Link: http://www.castaglia.org/proftpd/modules/mod_vroot.html (btw: why can't I find this module in proftpd.org?) - init/rc script or systemd unit can be modified to execute proftpd under given user instead of (or in affition to) using User and Group directives (works here) - having log directory (e.g. /var/log/proftpd) and run directory (e.g. /run/proftpd) writable by proftpd makes it easier to fullfill writable requirements for: PidFile ScoreboardFile DelayTable TransferLog SystemLog ServerLog SFTPLog and others. - logrotate script should be changed to create log file(s) as configured user ...or not create the file and let proftpd do that - systemd unit must be configured to use pid file configured above - use: AuthOrder mod_auth_file.c* to skip system authentication (not sure if the * is required, but shouldn't hurt) - In case of using virtual hosts, many of directives should be either repeated in <VirtualHost> or placed into <Global> secion, because of how Proftpd's virtual hosts work. This applies to directives mentioned above or in referenced document http://www.proftpd.org/docs/howto/Nonroot.html SystemLog WtmpLog TransferLog AuthUserFile AuthGroupFile AuthPAM AuthOrder VRootEngine DefaultRoot ...and all other directives applicable in <VirtualHost> anf <Global> context. -- Matus UHLAR - fantomas, uh...@fa... ; http://www.fantomas.sk/ Warning: I wish NOT to receive e-mail advertising to this address. Varovanie: na tuto adresu chcem NEDOSTAVAT akukolvek reklamnu postu. I drive way too fast to worry about cholesterol. |
|
From: Dieter B. <pr...@bl...> - 2026-03-16 17:05:53
|
Hello TJ, On Mon, Mar 16, TJ Saunders wrote: > > I would like to disable DSA Key support so that no user can use > > this key type anymore. > > Is it possible to disable this via the configuration? > > I'm assuming this is referring to SSH public key authentication? If so, you should be able to use the SFTPPublicKeys directive to configure the list of algorithms you'd like, omitting the DSA algorithm, i.e. "ssh-dss"; see: > > http://www.proftpd.org/docs/contrib/mod_sftp.html#SFTPAuthPublicKeys > > Hope this helps, Yes, this will help. Thank you for the hind! -- Regards Dieter -- I do not get viruses because I do not use MS software. If you use Outlook then please do not put my email address in your address-book so that WHEN you get a virus it won't use my address in the >From field. |
|
From: TJ S. <tj...@ca...> - 2026-03-16 16:12:20
|
> I would like to disable DSA Key support so that no user can use > this key type anymore. > Is it possible to disable this via the configuration? I'm assuming this is referring to SSH public key authentication? If so, you should be able to use the SFTPPublicKeys directive to configure the list of algorithms you'd like, omitting the DSA algorithm, i.e. "ssh-dss"; see: http://www.proftpd.org/docs/contrib/mod_sftp.html#SFTPAuthPublicKeys Hope this helps, TJ |
|
From: Dieter B. <pr...@bl...> - 2026-03-16 11:54:52
|
Hello, I would like to disable DSA Key support so that no user can use this key type anymore. Is it possible to disable this via the configuration? -- Regards Dieter -- I do not get viruses because I do not use MS software. If you use Outlook then please do not put my email address in your address-book so that WHEN you get a virus it won't use my address in the >From field. |
|
From: Matus U. - f. <uh...@fa...> - 2026-03-13 16:53:48
|
>> Did anyone try to run ProFTPD completely under pon-privileged user? >> >> I guess It would need: >> >> - changing init script/systemd unit >> (directive User doesn't prevent from being able to setuid() etc) >> - using mod_vroot >> >> - listen on port>1024 >> - non-system user database (I guess even for single anonymous user) >> - setting paths/permissions for log, lock, pid files >> >> Does it need any changes more than that? >> Does it work? On 13.03.26 09:24, TJ Saunders wrote: >It can be done, yes -- depending on the desired configuration, of course. This might help: > > http://www.proftpd.org/docs/howto/Nonroot.html Oh my... I completely missed that. Thanks! -- Matus UHLAR - fantomas, uh...@fa... ; http://www.fantomas.sk/ Warning: I wish NOT to receive e-mail advertising to this address. Varovanie: na tuto adresu chcem NEDOSTAVAT akukolvek reklamnu postu. Chernobyl was an Windows 95 beta test site. |
|
From: TJ S. <tj...@ca...> - 2026-03-13 16:41:51
|
> Did anyone try to run ProFTPD completely under pon-privileged user? > > I guess It would need: > > - changing init script/systemd unit > (directive User doesn't prevent from being able to setuid() etc) > - using mod_vroot > > - listen on port>1024 > - non-system user database (I guess even for single anonymous user) > - setting paths/permissions for log, lock, pid files > > Does it need any changes more than that? > Does it work? It can be done, yes -- depending on the desired configuration, of course. This might help: http://www.proftpd.org/docs/howto/Nonroot.html Cheers, TJ |
|
From: Matus U. - f. <uh...@fa...> - 2026-03-13 13:32:43
|
Hello, Did anyone try to run ProFTPD completely under pon-privileged user? I guess It would need: - changing init script/systemd unit (directive User doesn't prevent from being able to setuid() etc) - using mod_vroot - listen on port>1024 - non-system user database (I guess even for single anonymous user) - setting paths/permissions for log, lock, pid files Does it need any changes more than that? Does it work? -- Matus UHLAR - fantomas, uh...@fa... ; http://www.fantomas.sk/ Warning: I wish NOT to receive e-mail advertising to this address. Varovanie: na tuto adresu chcem NEDOSTAVAT akukolvek reklamnu postu. Windows found: (R)emove, (E)rase, (D)elete |
|
From: John S. <jo...@st...> - 2025-12-03 19:56:32
|
>>>>> "Brad" == Brad Knorr <br...@kn...> writes:
> Trying to understand,
Trying to help! :-) Hopefully this isn't totally off the wall or
redundant. But it would also help if you post your configuration
settings so we can look them over as well.
> So the basic functionality of this module is to receive two parameters
> Username and password. If the endpoint returns a 200, we are good, if it returns
> 403 we are not good. Pretty simple.
Yup. I admit I don't use this, so I'm curious how you configure
this. I assume following the examples in the docs?
> Where I am struggling, is about how to direct proftp to allow the
> permitted user to only access their files.
So are these real system users or virtual users? If they're virtual
users, you should just have them isolated to their own directory tree
using the option:
DefaultRoot ~
which will lock them into their home directory. So you might need to
add this info into your mod_auth_web setup, so that the lookup returns
a 200 code with the directory to use for that user. I personally just use
local group and passwd files in a seperate proftpd only area, setup in
the <global> block:
<global>
# That '*' makes that module authoritative and prevents proftpd from
# falling through to system logins, etc
RequireValidShell off
AuthOrder mod_auth_file.c*
AuthUserFile /ftp/etc/passwd
AuthGroupFile /ftp/etc/group
<Directory /ftp/customers>
HideNoAccess on
</Directory>
</global>
But I also have to configure a per-user cfg file that gives the
various access permissions. All the files are owned by a single
account, but proftpd does all the work of keeping stuff seperate from
each other.
So my main proftpd.conf file I have:
# Per-user configuration files, not server setup configs, must be generated for each user.
Include /ftp/etc/customers/*.cfg
And an exmaple file looks like this:
$ cat /ftp/etc/customers/customer.cfg
<Directory /ftp/customers/customer>
HideNoAccess on
<Limit ALL>
DenyAll
</Limit>
<Limit INFO REALPATH LSTAT CWD PWD LIST MLST STAT READ OPENDIR READDIR>
AllowUser customer
AllowGroup customer
</Limit>
</Directory>
Does this help?
> The files are in a dir structure as follows:
>
> /userdata/jimmy
> /bob
>
> Jimmy and bobs files have a uid and gid of 1000,1001 respectively.
>
> How does proftp know which dir to authorized the user to?
>
> If this mod doesn’t support this, I have a mongo db auth db. If I were to write
> A mod that will auth to mongo, can I send proftpd, this relevant information?
|
|
From: Brad K. <br...@kn...> - 2025-12-03 18:41:02
|
Trying to understand,
So the basic functionality of this module is to receive two parameters
Username and password. If the endpoint returns a 200, we are good, if it
returns
403 we are not good. Pretty simple.
Where I am struggling, is about how to direct proftp to allow the permitted
user to only access their files.
The files are in a dir structure as follows:
/userdata/jimmy
/bob
Jimmy and bobs files have a uid and gid of 1000,1001 respectively.
How does proftp know which dir to authorized the user to?
If this mod doesn’t support this, I have a mongo db auth db. If I were to
write
A mod that will auth to mongo, can I send proftpd, this relevant
information?
Thanks
Brad
|