tls.conf 2.9 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465
  1. #
  2. # Proftpd sample configuration for FTPS connections.
  3. #
  4. # Note that FTPS impose some limitations in NAT traversing.
  5. # See http://www.castaglia.org/proftpd/doc/contrib/ProFTPD-mini-HOWTO-TLS.html
  6. # for more information.
  7. #
  8. <IfModule mod_dso.c>
  9. # If mod_tls was built as a shared/DSO module, load it
  10. LoadModule mod_tls.c
  11. </IfModule>
  12. <IfModule mod_tls.c>
  13. TLSEngine on
  14. TLSLog /var/log/proftpd/tls.log
  15. # this is an example of protocols, proftp works witl all, but use only the most secure ones like TLSv1.1 and TLSv1.2
  16. TLSCipherSuite ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256
  17. TLSProtocol TLSv1.2 TLSv1.3
  18. TLSServerCipherPreference on
  19. #
  20. # Server SSL certificate. You can generate a self-signed certificate using
  21. # a command like:
  22. #
  23. # openssl req -x509 -newkey rsa:1024 \
  24. # -keyout /etc/ssl/private/proftpd.key -out /etc/ssl/certs/proftpd.crt \
  25. # -nodes -days 365
  26. #
  27. # The proftpd.key file must be readable by root only. The other file can be
  28. # readable by anyone.
  29. #
  30. # chmod 0600 /etc/ssl/private/proftpd.key
  31. # chmod 0640 /etc/ssl/private/proftpd.key
  32. #
  33. TLSRSACertificateFile /usr/local/hestia/ssl/certificate.crt
  34. TLSRSACertificateKeyFile /usr/local/hestia/ssl/certificate.key
  35. #
  36. # CA the server trusts...
  37. #TLSCACertificateFile /etc/ssl/certs/CA.pem
  38. # ...or avoid CA cert and be verbose
  39. #TLSOptions NoCertRequest EnableDiags
  40. # ... or the same with relaxed session use for some clients (e.g. FireFtp)
  41. #TLSOptions NoCertRequest EnableDiags NoSessionReuseRequired
  42. #
  43. #
  44. # Per default drop connection if client tries to start a renegotiate
  45. # This is a fix for CVE-2009-3555 but could break some clients.
  46. #
  47. #TLSOptions AllowClientRenegotiations
  48. #
  49. TLSOptions NoSessionReuseRequired AllowClientRenegotiations
  50. # Authenticate clients that want to use FTP over TLS?
  51. #
  52. #TLSVerifyClient off
  53. #
  54. # Are clients required to use FTP over TLS when talking to this server?
  55. #
  56. TLSRequired off
  57. #
  58. # Allow SSL/TLS renegotiations when the client requests them, but
  59. # do not force the renegotations. Some clients do not support
  60. # SSL/TLS renegotiations; when mod_tls forces a renegotiation, these
  61. # clients will close the data connection, or there will be a timeout
  62. # on an idle data connection.
  63. #
  64. TLSRenegotiate required off
  65. </IfModule>