1. Please take a little time for this simple survey! Thank you for participating!
    Dismiss Notice
  2. Dear Pleskians, please read this carefully! New attachments and other rules Thank you!
    Dismiss Notice
  3. Dear Pleskians, I really hope that you will share your opinion in this Special topic for chatter about Plesk in the Clouds. Thank you!
    Dismiss Notice

ftp access at root level

Discussion in 'Plesk 9.x for Linux Issues, Fixes, How-To' started by kadoudal, Nov 15, 2010.

  1. kadoudal

    kadoudal Regular Pleskian

    27
    23%
    Joined:
    Nov 20, 2007
    Messages:
    244
    Likes Received:
    0
    ftp (Proftpd) is running well for all domains and sub-domains created via Plesk

    I am trying to access my server via ftp at root level ( path / ) via a client or via console , and I cannot ..
    credentials are not accepted..
    should I ( and can I ?) create an ftp user for the Plesk admin ? if yes ? how ?

    ( console ssh access is fine , so the credentials are good...)
     
  2. BoiseComputer

    BoiseComputer Regular Pleskian

    28
    23%
    Joined:
    Apr 14, 2006
    Messages:
    143
    Likes Received:
    5
    Location:
    Boise, Idaho
    WinSCP

    Why don't you use something like WinSCP which will use SSH to transfer files? It is much more secure and especially with the ProFTPd vulnerability it might be a good idea to keep away from giving your FTP server access to /
     
  3. kadoudal

    kadoudal Regular Pleskian

    27
    23%
    Joined:
    Nov 20, 2007
    Messages:
    244
    Likes Received:
    0
    ftp access

    Yes , I understand ... I read about the RootLogin stuff being dangerous.. and better use SCP..

    I'll try to find something similar to WinSCP on Mac .. as I run OS X

    thanks
     
  4. BoiseComputer

    BoiseComputer Regular Pleskian

    28
    23%
    Joined:
    Apr 14, 2006
    Messages:
    143
    Likes Received:
    5
    Location:
    Boise, Idaho
    WinSCP

    One possibility would be to run WinSCP using Wine on your Mac.
     
Loading...