Hello, <br><br>Its fixed now, it seems to be it was a easy fix and I was kind of waisting your time, but thanks for the answers. I did google it and couldn't get a good answer. <br><br>@ Nico Kadel-Garcia<br><br>Currently this server is setup for back-up the our other 3 servers and people can get FTP for backing-up there site. I prefer FTP because people *know* FTP, when I give them something different to use there is a change they are scared and will not use it.<br>
<br>Best, <br><br>Huib<br><br><div class="gmail_quote">2011/3/14 Nico Kadel-Garcia <span dir="ltr"><<a href="mailto:nkadel@gmail.com">nkadel@gmail.com</a>></span><br><blockquote class="gmail_quote" style="margin: 0pt 0pt 0pt 0.8ex; border-left: 1px solid rgb(204, 204, 204); padding-left: 1ex;">
<div class="im">On Mon, Mar 14, 2011 at 1:27 PM, Huib Laurens <<a href="mailto:sterkebak@gmail.com">sterkebak@gmail.com</a>> wrote:<br>
</div><div class="im">> Hello,<br>
><br>
> I have setup a centos server running 5.5 and I have a problem with the FTP<br>
> settings.<br>
><br>
> Currently I have two FTP accounts based on that server, they lead to:<br>
><br>
> /home/bella<br>
> /home/carmen<br>
><br>
> Currently the FPT accounts starts in the home directory when they are logged<br>
> in. But they are able to see all directories on the server. What can I do to<br>
> make sure they cant come out of there home directory?<br>
><br>
> --<br>
> Regards,<br>
> Huib "Abigor" Laurens<br>
<br>
</div>First things first. *DO NOT* use FTP. It's a blatantly insecure<br>
protocl and passes passwords, and data, in the clear.<br>
<br>
Second, if you *MUST* use FTP, do not use it with normal usernames and<br>
passwords.<br>
<br>
Third, if you *MUST* use FTP, use FTPS which SSL tunnels the connections.<br>
<br>
Fourth, read the manual page on the "vsftpd" server. In particulare,<br>
review this:<br>
<br>
chroot_list_enable<br>
If activated, you may provide a list of local users who are<br>
placed in a chroot() jail in their home directory upon login. The<br>
meaning is slightly different if chroot_local_user is set to YES. In<br>
this case, the list becomes a list of users which are NOT to be placed<br>
in a chroot() jail. By default, the file containing this list is<br>
/etc/vsftpd.chroot_list, but you may override this with the<br>
chroot_list_file setting.<br>
Default: NO<br>
</blockquote></div><br><br clear="all"><br>-- <br><span style="font-family: comic sans ms,sans-serif;">Regards, </span><br style="font-family: comic sans ms,sans-serif;"><span style="font-family: comic sans ms,sans-serif;">Huib "Abigor" Laurens</span><br style="font-family: comic sans ms,sans-serif;">
<br style="font-family: comic sans ms,sans-serif;"><br><br><font color="#888888">Support Free Knowledge: <a href="http://wikimediafoundation.org/wiki/Donate" target="_blank">http://wikimediafoundation.org/wiki/Donate</a></font><br>
<br>