Very Secure FTP Daemon - Written from Scratch
Vsftpd is an FTP server, or daemon. The "vs" stands for Very Secure.
Obviously this is not a guarantee, but the entire codebase was written
with security in mind, and carefully designed to be resilient to
attack.
Recent evidence suggests that vsftpd is also extremely fast (and this
is before any explicit performance tuning!). In tests against wu-ftpd,
vsftpd was always faster, supporting over twice as many users in some
tests.
- Developed at network
- Sources inherited from project openSUSE:Factory
-
7
derived packages
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout openSUSE:Backports:SLE-15-SP4:FactoryCandidates/vsftpd && cd $_
- Create Badge
Refresh
Refresh
Source Files
Filename | Size | Changed |
---|---|---|
README.SUSE | 0000000228 228 Bytes | |
vsftpd-2.0.4-dmapi.patch | 0000000516 516 Bytes | |
vsftpd-2.0.4-enable-ssl.patch | 0000000187 187 Bytes | |
vsftpd-2.0.4-lib64.diff | 0000000972 972 Bytes | |
vsftpd-2.0.4-xinetd.diff | 0000001133 1.11 KB | |
vsftpd-2.0.5-enable-debuginfo.patch | 0000000614 614 Bytes | |
vsftpd-2.0.5-utf8-log-names.patch | 0000002837 2.77 KB | |
vsftpd-2.0.5-vuser.patch | 0000000329 329 Bytes | |
vsftpd-2.3.5-conf.patch | 0000008280 8.09 KB | |
vsftpd-3.0.0-turn-seccomp-sandbox-off.patch | 0000000476 476 Bytes | |
vsftpd-3.0.0.tar.gz | 0000193166 189 KB | |
vsftpd.changes | 0000027479 26.8 KB | |
vsftpd.firewall | 0000000366 366 Bytes | |
vsftpd.init | 0000003029 2.96 KB | |
vsftpd.logrotate | 0000000201 201 Bytes | |
vsftpd.pam | 0000000569 569 Bytes | |
vsftpd.service | 0000000151 151 Bytes | |
vsftpd.spec | 0000005167 5.05 KB | |
vsftpd.xml | 0000002801 2.74 KB |
Revision 29 (latest revision is 90)
Stephan Kulow (coolo)
accepted
request 113215
from
Michal Vyskocil (mvyskocil)
(revision 29)
- update to upstream 3.0.0: * Make listen mode the default. * Fix missing "const" in ssl.c * Add seccompsandbox.c to support a seccomp filter sandbox; works against Ubuntu 12.04 ABI. * Rearrange ftppolicy.c a bit so the syscall list is easily comparable with seccompsandbox.c * Rename deprecated "sandbox" to "ptrace_sandbox". * Add a few more state checks to the privileged helper processes. * Add tunable "seccomp_sandbox", default on. * Use hardened build flags. * Retry creating a PASV socket upon port reuse race between bind() and listen(), patch from Ralph Wuerthner <ralph.wuerthner@de.ibm.com>. * Don't die() if recv() indicates a closed remote connection. Problem report on a Windows client from Herbert van den Bergh, <herbert.van.den.bergh@oracle.com>. * Add new config setting "allow_writeable_chroot" to help people in a bit of a spot with the v2.3.5 defensive change. Only applies to non-anonymous. * Remove a couple of fixed things from BUGS. * strlen() trunction fix -- no particular impact. * Apply some tidyups from mmoufid@yorku.ca. * Fix delete_failed_uploads if there is a timeout. Report from Alejandro Hernández Hdez <aalejandrohdez@gmail.com>. * Fix other data channel bugs such as failure to log failure upon timeout. * Use exit codes a bit more consistently. * Fix bad interaction between SSL and trans_chunk_size. * Redo data timeout to fire properly for SSL sessions. * Redo idle timeout to fire properly for SSL sessions. * Make sure PROT_EXEC isn't allowed, thanks to Will Drewry for noticing. * Use 10 minutes as a max linger time just in case an alarm gets lost.
Comments 0