.\" Copyright (c) 1985, 1988, 1991 The Regents of the University of California.
.\" Redistribution and use in source and binary forms, with or without
.\" modification, are permitted provided that the following conditions
.\" 1. Redistributions of source code must retain the above copyright
.\" notice, this list of conditions and the following disclaimer.
.\" 2. Redistributions in binary form must reproduce the above copyright
.\" notice, this list of conditions and the following disclaimer in the
.\" documentation and/or other materials provided with the distribution.
.\" 3. All advertising materials mentioning features or use of this software
.\" must display the following acknowledgement:
.\" This product includes software developed by the University of
.\" California, Berkeley and its contributors.
.\" 4. Neither the name of the University nor the names of its contributors
.\" may be used to endorse or promote products derived from this software
.\" without specific prior written permission.
.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
.\" @(#)ftpd.8 6.9 (Berkeley) 3/16/91
Internet File Transfer Protocol server
Internet File Transfer Protocol
server process. The server uses the
and listens at the port specified in the
service specification; see
Debugging information is written to the syslog.
session is logged in the syslog.
The inactivity timeout period is set to
seconds (the default is 15 minutes).
A client may also request a different timeout period;
the maximum period allowed may be set to
The default limit is 2 hours.
The ftp server currently supports the following ftp
requests; case is not distinguished.
.Bl -column "Request" -offset indent
.It Request Ta "Description"
.It ABOR Ta "abort previous command"
.It ACCT Ta "specify account (ignored)"
.It ALLO Ta "allocate storage (vacuously)"
.It APPE Ta "append to a file"
.It CDUP Ta "change to parent of current working directory"
.It CWD Ta "change working directory"
.It DELE Ta "delete a file"
.It HELP Ta "give help information"
.It LIST Ta "give list files in a directory" Pq Dq Li "ls -lgA"
.It MKD Ta "make a directory"
.It MDTM Ta "show last modification time of file"
.It MODE Ta "specify data transfer" Em mode
.It NLST Ta "give name list of files in directory"
.It PASS Ta "specify password"
.It PASV Ta "prepare for server-to-server transfer"
.It PORT Ta "specify data connection port"
.It PWD Ta "print the current working directory"
.It QUIT Ta "terminate session"
.It REST Ta "restart incomplete transfer"
.It RETR Ta "retrieve a file"
.It RMD Ta "remove a directory"
.It RNFR Ta "specify rename-from file name"
.It RNTO Ta "specify rename-to file name"
.It SITE Ta "non-standard commands (see next section)"
.It SIZE Ta "return size of file"
.It STAT Ta "return status of server"
.It STOR Ta "store a file"
.It STOU Ta "store a file with a unique name"
.It STRU Ta "specify data transfer" Em structure
.It SYST Ta "show operating system type of server system"
.It TYPE Ta "specify data transfer" Em type
.It USER Ta "specify user name"
.It XCUP Ta "change to parent of current working directory (deprecated)"
.It XCWD Ta "change working directory (deprecated)"
.It XMKD Ta "make a directory (deprecated)"
.It XPWD Ta "print the current working directory (deprecated)"
.It XRMD Ta "remove a directory (deprecated)"
The following non-standard or
specific commands are supported
.Bl -column Request -offset indent
.It Sy Request Ta Sy Description
.It UMASK Ta change umask. Em E.g. SITE UMASK 002
.It IDLE Ta set idle-timer. Em E.g. SITE IDLE 60
.It CHMOD Ta change mode of a file. Em E.g.
.It HELP Ta give help information. Em E.g. SITE HELP
The remaining ftp requests specified in Internet
recognized, but not implemented.
MDTM and SIZE are not specified in
but will appear in the next updated FTP RFC.
The ftp server will abort an active file transfer only when the
command is preceded by a Telnet "Interrupt Process" (IP)
signal and a Telnet "Synch" signal in the command Telnet stream,
command is received during a data transfer, preceded by a Telnet IP
and Synch, transfer status will be returned.
interprets file names according to the
This allows users to utilize the metacharacters
authenticates users according to three rules.
The user name must be in the password data base,
and not have a null password. In this case a password
must be provided by the client before any file operations
The user name must not appear in the file
The user must have a standard shell returned by
anonymous ftp account must be present in the password
In this case the user is allowed
to log in by specifying any password (by convention this
is given as the client host's name).
takes special measures to restrict the client's access privileges.
command to the home directory of the
In order that system security is not breached, it is recommended
subtree be constructed with care; the following
.Bl -tag -width "~ftp/pub" -offset indent
Make the home directory owned by
and unwritable by anyone.
Make this directory owned by the super-user and unwritable by
must be present to support the list command. This
program should have mode 111.
Make this directory owned by the super-user and unwritable by
command to be able to produce owner names rather than numbers.
is not used, and should not contain real encrypted passwords.
These files should be mode 444.
Make this directory mode 777 and owned by
should then place files which are to be accessible via the
anonymous account in this directory.
The anonymous account is inherently dangerous and should
The server must run as the super-user
to create sockets with privileged port numbers. It maintains
an effective user id of the logged in user, reverting to
the super-user only when binding addresses to sockets. The
possible security holes have been extensively
scrutinized, but are possibly incomplete.