I am working on what I thought was a very simple script to dynamically create an FTP user using 'useradd' There are several parts of this process I am unfamiliar with, and an entire day's research has not gotten me too far. Here is what I have:
password="pass"
pass=$(perl -e 'print crypt($ARGV[0], "wtf")' $password)
useradd -d HOME_DIR -s /bin/bash -g GROUP -p $pass -f -1 testing
Notes
Topics:
Let me know if I am going about this all wrong, or if what I am trying to do is not possible or if I am misinformed about anything I have stated herein. Thank you for any help you can provide. :D
This command line creates a new user with home directory, using the command "useradd". The command "mkpasswd" lets you encrypt the password e.g. with SHA-512 method. This line ensures that your password is written encrypted in /etc/shadow" so you can log in with the new user.
Another way to create users with a password is to use the -p option of useradd, but that option requires an encrypted password. You can generate this encrypted password with the openssl passwd command. The openssl passwd command will generate several distinct hashes for the same password, for this it uses a salt.
passwd -S <username> The -S option displays the status of user account password settings. For example: # passwd -S evans evans PS 2020-09-07 0 99999 7 -1 (Password set, SHA512 crypt.) The output above shows the account evans was created on 7th September 2020 and has a password set with SHA512 encryption.
Regarding password generation:
32.3 Encrypting Passwords
Function: char * crypt (const char *key, const char *salt)
The
crypt
function takes a password, key, as a string, and a salt character array which is described below, and returns a printable ASCII string which starts with another salt. It is believed that, given the output of the function, the best way to find a key that will produce that output is to guess values of key until the original value of key is found.The salt parameter does two things. Firstly, it selects which algorithm is used, the MD5-based one or the DES-based one. Secondly, it makes life harder for someone trying to guess passwords against a file containing many passwords; without a salt, an intruder can make a guess, run
crypt
on it once, and compare the result with all the passwords. With a salt, the intruder must runcrypt
once for each different salt.For the MD5-based algorithm, the salt should consist of the string
$1$
, followed by up to 8 characters, terminated by either another$
or the end of the string. The result of crypt will be the salt, followed by a$
if the salt didn't end with one, followed by 22 characters from the alphabet./0-9A-Za-z
, up to 34 characters total. Every character in the key is significant.For the DES-based algorithm, the salt should consist of two characters from the alphabet
./0-9A-Za-z
, and the result ofcrypt
will be those two characters followed by 11 more from the same alphabet, 13 in total. Only the first 8 characters in the key are significant.The MD5-based algorithm has no limit on the useful length of the password used, and is slightly more secure. It is therefore preferred over the DES-based algorithm.
When the user enters their password for the first time, the salt should be set to a new string which is reasonably random. To verify a password against the result of a previous call to crypt, pass the result of the previous call as the salt.
Depending on your system, there may also be Blowfish or SHA-2 family crypt
s as well, and it's possible that the traditional DES may be disabled for security. PAM can add its own complications in here too.
ID | Method ------------------------------- 1 | MD5 (Linux, BSD) 2a | Blowfish (OpenBSD) md5 | Sun MD5 5 | SHA-256 (Linux, since glibc 2.7) 6 | SHA-512 (Linux, since glibc 2.7)
That being said, the
root# useradd -d / -g users -p $(perl -e'print crypt("foo", "aa")') -M -N foo user$ su - foo Password: foo foo$ ^D root# userdel foo
works just fine on my system.
Regarding the shell:
/sbin/nologin
is traditional for login-disabled users. You'll have to double-check your FTP daemon's configuration to see if that excludes them from FTP access.
Regarding the disabled account:
As seen above, works for me, as expected if given a working password.
About the other solution:
What don't you understand about the alternate solution? It seems very clear to me.
Just pipe "username:password
" into "chpasswd
".
If you want FTP-only users, I would recommend using a FTP daemon that supports virtual users like glftpd, Pure-FTPd, ProFTPD, vsftpd, ... actually it seems that all the common ones do. This way, an FTP account does not require a real system account.
If you want to create "FTP only" users, you should look at rssh Install rssh for your distro, and set the shell for the "FTP only" user to "/usr/bin/rssh"
Works very well
If you love us? You can donate to us via Paypal or buy me a coffee so we can maintain and grow! Thank you!
Donate Us With