FTP Server
Edit and validate the live Pure-FTPd configuration. This page is available only when the file-transfer service (FTP) is installed and enabled. Access: root.
What you’re editing
/etc/pure-ftpd/pure-ftpd.conf— global server behavior: auth backends, TLS, passive ports, limits, and logging.
Editor and apply flow
- Click Validate & Apply Changes to save and test the config.
 - A backup is written to 
/etc/pure-ftpd/pure-ftpd.conf.bakbefore saving. - The configuration is validated; on error, the backup is restored and the error is shown.
 - On success, the service is restarted and its active state is verified.
 - Safety limit: files over 1 MB are refused by the editor.
 
How Synconix wires FTP
- TLS & SNI certificates: Pure-FTPd uses the pure-certd helper for per-hostname TLS
      via 
ExtCert /run/pure-certd.sock; TLS is enforced (TLS 1). - External authentication: Logins go through the Synconix pure-auth plugin
      via 
ExtAuth /run/pureftpd-auth.sock. PAM/Unix auth can also be enabled. - Passive ports: 
PassivePortRange 49152 65534— open this range in your firewall. - Anonymous access: disabled by default (
NoAnonymous yes). - Logging: rsyslog routes logs per domain and per user under
      
/var/log/domains/<domain>/and/var/log/accounts/<login>/. - Systemd units: managed services: 
pure-authd,pure-certd,pure-ftpd. 
Common directives to review
TLSon; verify certs via pure-certd.ExtAuth/ExtCertsockets.PassivePortRangealigned with firewall/NAT.MaxIdleTimefor idle disconnects.BrokenClientsCompatibilityfor legacy clients.
Operational tips
- Open TCP 
21and the passive range on your firewall/LB. - Verify pure-auth mapping for virtual users before tightening policy.
 - Use SNI-aware clients for hostname-specific certificates.
 
Troubleshooting
- Validation failed: fix the reported lines; previous config is restored automatically.
 - Service not active: check detailed 
systemdstatus and retry. - TLS/login issues: confirm 
pure-certd/pure-authdare running and socket paths match. 
  Caution: FTP grants external file access. Keep TLS on, restrict passive ports, and review auth policies before applying on production.