1200字范文,内容丰富有趣,写作的好帮手!
1200字范文 > 【内网穿透服务器】使用Frp外网访问内网FTP服务器(以访问内网samba服务为例)

【内网穿透服务器】使用Frp外网访问内网FTP服务器(以访问内网samba服务为例)

时间:2022-05-28 23:16:42

相关推荐

【内网穿透服务器】使用Frp外网访问内网FTP服务器(以访问内网samba服务为例)

使用Frp外网访问内网FTP服务器(以访问内网samba服务为例)

FTP是基于TCP的服务,使用两个端口,命令端口和数据端口,命令端口是21,数据端口在主动模式下为20,在被动模式随机分配。

FTP协议有两种工作方式:PORT方式和PASV方式,中文意思为主动式和被动式。

主动(PORT):

PORT(主动)方式的连接过程是:客户端向服务器的FTP端口(默认是21)发送连接请求,服务器接受连接,建立一条命令链路。当需要传送数据时,客户端在命令链路上用PORT命令告诉服务器:“我打开了XXXX端口,你过来连接我”。于是服务器从20端口向客户端的XXXX端口发送连接请求,建立一条数据链路来传送数据。

主动模式存在的问题是,在客户端一般都会有防火墙的设置,当服务端与客户端数据进行数据通信时,客户端的防火墙会将服务端的端口挡在外面。此时,通信就会受阻。因此,被动模式就产生了。

被动(PASV):

PASV(被动)方式的连接过程是:客户端向服务器的FTP端口(默认是21)发送连接请求,服务器接受连接,建立一条命令链路。当需要传送数据时,服务器在命令链路上用PASV命令告诉客户端:“我打开了XXXX端口,你过来连接我”。于是客户端向服务器的XXXX端口发送连接请求,建立一条数据链路来传送数据。

被动模式也会存在防火墙的问题,客户端与服务端传输数据时,在服务端也会有防火墙,但在服务端的防火墙有连接追踪的功能,解决了防火墙的问题。因此,一般使用被动模式比较多。

一、服务端和客户端开启FTP服务(以vsftpd为例)

1. 两台服务器操作相同,安装vsftpd来完成FTP的设置(进入root权限操作:su root)

rpm -qa|grep vsftpd #确定是否存在 vsftpd -version

sudo apt-get install vsftpdyum -y install vsftpdsudo /etc/init.d/vsftpd restart sudo service vsftpd restart

2. 修改FTP配置文件:

vi /etc/vsftpd/vsftpd.conf也许在 /etc/vsftpd.conf

覆盖成以下内容:

# Example config file /etc/vsftpd/vsftpd.conf # # The default compiled in settings are fairly paranoid. This sample file # loosens things up a bit, to make the ftp daemon more usable. # Please see vsftpd.conf.5 for all compiled in defaults. # # READ THIS: This example file is NOT an exhaustive list of vsftpd options. # Please read the vsftpd.conf.5 manual page to get a full idea of vsftpd's # capabilities. # # Allow anonymous FTP? (Beware - allowed by default if you comment this out). anonymous_enable=YES # # Uncomment this to allow local users to log in. # When SELinux is enforcing check for SE bool ftp_home_dir local_enable=YES # # Uncomment this to enable any form of FTP write command. write_enable=YES # # Default umask for local users is 077. You may wish to change this to 022, # if your users expect that (022 is used by most other ftpd's) local_umask=022 # # Uncomment this to allow the anonymous FTP user to upload files. This only # has an effect if the above global write enable is activated. Also, you will # obviously need to create a directory writable by the FTP user. # When SELinux is enforcing check for SE bool allow_ftpd_anon_write, allow_ftpd_full_access #anon_upload_enable=YES # # Uncomment this if you want the anonymous FTP user to be able to create # new directories. #anon_mkdir_write_enable=YES # # Activate directory messages - messages given to remote users when they # go into a certain directory. dirmessage_enable=YES # # Activate logging of uploads/downloads. xferlog_enable=YES # # Make sure PORT transfer connections originate from port 20 (ftp-data). connect_from_port_20=YES # # If you want, you can arrange for uploaded anonymous files to be owned by # a different user. Note! Using "root" for uploaded files is not # recommended! #chown_uploads=YES #chown_username=whoever # # You may override where the log file goes if you like. The default is shown # below. #xferlog_file=/var/log/xferlog # # If you want, you can have your log file in standard ftpd xferlog format. # Note that the default log file location is /var/log/xferlog in this case. xferlog_std_format=YES # # You may change the default value for timing out an idle session. #idle_session_timeout=600 # # You may change the default value for timing out a data connection. #data_connection_timeout=120 # # It is recommended that you define on your system a unique user which the # ftp server can use as a totally isolated and unprivileged user. #nopriv_user=ftpsecure # # Enable this and the server will recognise asynchronous ABOR requests. Not # recommended for security (the code is non-trivial). Not enabling it, # however, may confuse older FTP clients. #async_abor_enable=YES # # By default the server will pretend to allow ASCII mode but in fact ignore # the request. Turn on the below options to have the server actually do ASCII # mangling on files when in ASCII mode. The vsftpd.conf(5) man page explains # the behaviour when these options are disabled. # Beware that on some FTP servers, ASCII support allows a denial of service # attack (DoS) via the command "SIZE /big/file" in ASCII mode. vsftpd # predicted this attack and has always been safe, reporting the size of the # raw file. # ASCII mangling is a horrible feature of the protocol. #ascii_upload_enable=YES #ascii_download_enable=YES # # You may fully customise the login banner string: #ftpd_banner=Welcome to blah FTP service. # # You may specify a file of disallowed anonymous e-mail addresses. Apparently # useful for combatting certain DoS attacks. #deny_email_enable=YES # (default follows) #banned_email_file=/etc/vsftpd/banned_emails # # You may specify an explicit list of local users to chroot() to their home # directory. If chroot_local_user is YES, then this list becomes a list of # users to NOT chroot(). # (Warning! chroot'ing can be very dangerous. If using chroot, make sure that # the user does not have write access to the top level directory within the # chroot) #chroot_local_user=YES #chroot_list_enable=YES # (default follows) #chroot_list_file=/etc/vsftpd/chroot_list # # You may activate the "-R" option to the builtin ls. This is disabled by # default to avoid remote users being able to cause excessive I/O on large # sites. However, some broken FTP clients such as "ncftp" and "mirror" assume # the presence of the "-R" option, so there is a strong case for enabling it. #ls_recurse_enable=YES # # When "listen" directive is enabled, vsftpd runs in standalone mode and # listens on IPv4 sockets. This directive cannot be used in conjunction # with the listen_ipv6 directive. listen=YES # # This directive enables listening on IPv6 sockets. By default, listening # on the IPv6 "any" address (::) will accept connections from both IPv6 # and IPv4 clients. It is not necessary to listen on *both* IPv4 and IPv6 # sockets. If you want that (perhaps because you want to listen on specific # addresses) then you must run two copies of vsftpd with two configuration # files. # Make sure, that one of the listen options is commented !! pasv_enable=YES pasv_min_port=10000 pasv_max_port=10003 pasv_promiscuous=YESchroot_list_enable=NOchroot_local_user=NOutf8_filesystem=YESallow_writeable_chroot=YESlocal_root=/samba/

3. 关于上述配置,做以下解释:
(1) pasv_enable=YES

FTP内网穿透需要采用被动模式。

(2) pasv_port

服务器用于数据传输的随机端口需要用“pasv_max_port” 和 “pasv_min_port’”设置范围

这里意思是只允许使用10000,10001,10002,10003这四个端口连接,间接的意思是只能同时有四个用户连接。

(3) chroot
(4) 默认访问目录与权限

allow_writeable_chroot=YESlocal_root=/samba/

/samba/目录是你要访问的目录 ,并开启权限。这里由于是为了远程外网访问内网服务器samba服务,所以直接设置默认访问目录为samba目录,该目录挂载了移动硬盘,具体操作方法可见我的博文。

4. 端口放行

#查看iptables是否已安装iptables --version#查看放行端口iptables -nL#开启指定端口 (开:ACCEPT 关:DROP)iptables -I INPUT -i eth0 -p tcp --dport 20 -j ACCEPTiptables -I OUTPUT -o eth0 -p tcp --sport 20 -j ACCEPTiptables -I INPUT -i eth0 -p tcp --dport 21 -j ACCEPTiptables -I OUTPUT -o eth0 -p tcp --sport 21 -j ACCEPTiptables -I INPUT -i eth0 -p tcp --dport 10000:10003 -j ACCEPTiptables -I OUTPUT -o eth0 -p tcp --sport 10000:10003 -j ACCEPT#验证iptables -nL

5. 启动ftp服务

#启动sudo /etc/init.d/vsftpd restart#查看状态(务必查看)service vsftpd status#确保端口被监听netstat -natp

如果在检查vsftpd status显示下图,请完全复制上面的配置文件。

下图表示vsftpd status正常,vsftpd已开始正常运行。

此时,可以通过FileZilla、WinSCP等,通过FTP协议访问服务器。

6. 放行root用户(可选)

ftp默认是不允许root用户操作的,如果我们想直接进入根目录进行操作,可以选择放行root用户:

cd /etc/vsftpd # 进入vsftpd目录ls# 查看该目录包含的文件vi ftpusers # 在root前加#注释rootvi user_list# 在root前加#注释root

二、配置FRP

1. frps配置:

sudo apt-get updatewget /fatedier/frp/releases/download/v0.17.0/frp_0.17.0_linux_amd64.tar.gztar -zxvf frp_0.17.0_linux_amd64.tar.gz #解压缩:tar xvf 文件名cd frp_0.17.0_linux_amd64#进入解压目录#修改frps.ini文件sudo vim ./frps.ini添加以下内容:

[common]bind_addr = 0.0.0.0 # 0.0.0.0为服务器全局所有IP可用,假如你的服务器有多个IP则可以这样做,或者填写为指定其中的一个服务器IP,支持IPV6.bind_port = 7000 # 客户端与服务端进行通信的端口,即frp服务端口,需与客户端server_port一致dashboard_port = 7500 # 控制台端口 通过 Dashboard 可以方便的查看 FRP 的状态以及代理统计信息展示 通过 http://[server_addr]:7500 访问 Dashboard 界面,用户名密码默认都为 admin。

#后台保持启动 需要在frp_0.17.0_linux_amd64目录下操作nohup ./frps -c ./frps.ini &

返回:nohup: ignoring input and appending output to ‘nohup.out’ 代表执行成功,ctrl+c关闭即可;用ps -ef 会在进程中看见frp工作进程。

2. frpc配置:

sudo apt-get updatewget /fatedier/frp/releases/download/v0.17.0/frp_0.17.0_linux_arm.tar.gztar -zxvf frp_0.17.0_linux_arm.tar.gz #解压缩:tar xvf 文件名cd frp_0.17.0_linux_arm#进入解压目录#修改frps.ini文件sudo vim ./frpc.ini添加以下内容(需要删除注释):

[common]server_addr = your_server_ip#VPS服务器IPserver_port = 7000#端口,与服务端bind_port一致 [ftp]type = tcplocal_ip = 127.0.0.1local_port = 21remote_port = 2121[ftp1]type = tcplocal_ip = 127.0.0.1local_port = 10000remote_port = 10000[ftp2]type = tcplocal_ip = 127.0.0.1local_port = 10001remote_port = 10001[ftp3]type = tcplocal_ip = 127.0.0.1local_port = 10002remote_port = 10002[ftp4]type = tcplocal_ip = 127.0.0.1local_port = 10003remote_port = 10003

#强烈建议先运行该命令,只要运行过程中有错误,都会回显./frpc -c ./frpc.ini

如果运行报错,需要重新修改配置文件,需要先停止FRP的运行:

#查询进程与结束进程命令:ps -ef |grep frpckill -9 [进程号]

# 在frp_0.17.0_linux_arm目录下,启动命令./frpc -c ./frpc.ini# 后台启动nohup ./frpc -c ./frpc.ini &

设置为开机自动启动

sudo vim /etc/systemd/system/frpc.service

[Unit]Description=frpc daemonAfter=syslog.target network.targetWants=network.target[Service]Type=simpleExecStart=/home/pi/frp_0.17.0_linux_arm/frpc -c /home/pi/frp_0.17.0_linux_arm/frpc.iniRestart= alwaysRestartSec=1min[Install]WantedBy=multi-user.target

注意ExecStart中要配置成自己的绝对路径,绝对路径可以通过pwd命令查询。

#启动frpcsystemctl daemon-reloadsystemctl start frpc#设置为开机启动systemctl enable frpc

三、实现内外穿透,外网实现访问

方法1:ftp链接浏览器直接访问

通过 ftp://用户名:密码@IP:端口 的形式访问samba

方法2:使用FileZilla登陆FTP访问:

链接:/s/11hd0Kqw5pGxRcer6aBh__Q

提取码:jtn2

方法3:本地FTP映射:

最后友情提示一点,你是不是在用公网的服务器地址尝试连接本地内网的FTP文件夹,舍不得开热点,恐怕要经历失败(手动狗头)。点此了解出现 227 Entering Passive Mode错误 原因及解决方法。

本内容不代表本网观点和政治立场,如有侵犯你的权益请联系我们处理。
网友评论
网友评论仅供其表达个人看法,并不表明网站立场。