More recent versions of vsftpd have enabled a new security feature by default:
A user may not login to a chroot'ed environment, if the (ch)root folder is writable.
It's explained in vsftpd's FAQs:
I must admit, that I have to read up a bit more, why it's not good to have the user own the chroot'ed folder. Especially if the most typical use case for this is to limit users to their home directories (which are, of course, owned by them).vsftpd is protecting against dangerous configurations.
The cause of this message is usually dodgy ownership of the ftp home directory. The home directory should NOT be owned by the ftp user itself. Neither should it be writable by the ftp user.
However.
[SOLUTION]
In order to restore a setup to the same security and functionality state as with previous versions, you can override this by adding the following rule to your /etc/vsftpd.conf:
Code: Select all
allow_writeable_chroot=YES
For Ubuntu you can do the following:500 OOPS: unrecognised variable in config file: allow_writeable_chroot
- Add "The Frontier Group"'s PPA
- Update the vsftpd package (to the PPA version)
1) Install "The Frontier Group"'s PPA:
Code: Select all
$ sudo add-apt-repository ppa:thefrontiergroup/vsftpd
Code: Select all
$ sudo apt-get update
Code: Select all
$ sudo apt-get install vsftpd
Code: Select all
allow_writeable_chroot=YES
Code: Select all
$ sudo service vsftpd restart