FTP, or file transfer protocol, was a popular way to transfer files between local and remote computers in the past. Traditional FTP is rather insecure. When you login, your username and password are transmitted in clear text, raising the possibility of your credentials being sniffed.
If you still want to use FTP instead of a more secure alternative like SFTP, which uses the SSH protocol to implement file transfers, you can secure it somewhat by configuring FTP to use SSL.
You can quite easily configure your vsftpd server to use OpenSSL encryption, so that usernames & password, and even data files, are encrypted during transfer. It takes just a few simple steps.
In this tutorial, we’ll enable SSL support for VSFTPD in RHEL 6 – CentOS 6
1. Check whether the latest mod_ssl installed
2. Install the latest mod_ssl via yum
yum install mod_ssl
3. /etc/pki/tls/private/localhost.key – This is the private key of the host
/etc/pki/tls/certs/localhost.crt – This is the public key
Note: We’ll tell these files to vsftpd in vsftpd.conf file
4. Let’s try to connect vsftpd server without SSL first by using FileZilla
Normal ftp server is running
5. Enable SSL support
6. Restart vsftpd service
service vsftpd restart