• start_file_transfer permission denied

    From Daniel Path@2:371/52 to All on Sat Jan 3 19:43:18 2026
    Hello All,

    suddenly i have a problem with binkd. it is not transferring the files with the .tic file.

    binkd log:

    ? 02 Jan 04:30:49 [782417] start_file_transfer: /home/ftp/pub/fileechoes/z2pntseg/PNT46REG.002: Permission denied

    ftn@tentacle:~/log$ ls -ld /home/ftp/pub/fileechoes/z2pntseg/PNT46REG.002 -rw-r--r-- 1 ftn ftn 2467 Jan 2 04:20 /home/ftp/pub/fileechoes/z2pntseg/PNT46REG.002

    any ideas?

    ByEbYe
    --
    Daniel

    telnet://bbs.roonsbbs.hu:1212 <<=-

    ... Uptime: 7d 6h 57m 35s
    --- GoldED/2 1.1.4.7+EMX
    * Origin: Roon's BBS - Budapest, HUNGARY (2:371/52)
  • From Tommi Koivula@2:221/1 to Daniel Path on Sun Jan 4 09:19:24 2026
    Daniel Path wrote:


    suddenly i have a problem with binkd. it is not transferring the files
    with the .tic file.

    binkd log:

    ? 02 Jan 04:30:49 [782417] start_file_transfer: /home/ftp/pub/fileechoes/z2pntseg/PNT46REG.002: Permission denied

    ftn@tentacle:~/log$ ls -ld /home/ftp/pub/fileechoes/z2pntseg/PNT46REG.002 -rw-r--r-- 1 ftn ftn 2467 Jan 2 04:20 /home/ftp/pub/fileechoes/z2pntseg/PNT46REG.002

    any ideas?

    How do you run binkd? Did you update something lately?

    I noticed something like this too and I had to update /lib/systemd/system/binkd.service:

    [Unit]
    Description=binkd FidoTech TCP/IP mailer
    Documentation=man:binkd(8)
    After=network.target

    [Service]
    Restart=on-failure
    ExecStart=/usr/sbin/binkd /etc/binkd/binkd.cfg -q -C
    ExecReload=/bin/kill -HUP $MAINPID
    User=ftn
    Group=ftn
    ConfigurationDirectory=binkd
    StateDirectory=ftn
    ReadWritePaths=/var/log/binkd/
    ReadWritePaths=/var/spool/ftn/
    ReadWritePaths=/bbs/
    ======================== Added my bbs path here.
    PrivateDevices=yes
    PrivateTmp=yes
    ProtectClock=yes
    ProtectControlGroups=yes
    ProtectHome=yes
    ProtectHostname=yes
    ProtectKernelLogs=yes
    ProtectKernelModules=yes
    ProtectKernelTunables=yes
    ProtectSystem=strict
    RestrictAddressFamilies=AF_INET AF_INET6 AF_UNIX
    RestrictNamespaces=yes
    RestrictRealtime=yes
    RestrictSUIDSGID=yes
    LockPersonality=yes
    MemoryDenyWriteExecute=yes
    NoNewPrivileges=yes
    CapabilityBoundingSet=
    SystemCallArchitectures=native
    SystemCallErrorNumber=EPERM
    SystemCallFilter=@system-service

    [Install]
    WantedBy=multi-user.target


    'Tommi

    ---
    * Origin: news://news.fidonet.fi (2:221/1.0)
  • From Daniel Path@2:371/52 to Tommi Koivula on Tue Jan 6 14:12:56 2026
    Hello Tommi,

    Answering a msg of <04 Jan 26>, from you to me:

    ahh ha!

    i think this will do the trick. thanks!

    ByEbYe
    --
    Daniel

    telnet://bbs.roonsbbs.hu:1212 <<=-

    ... Uptime: 1d 4h 15m 31s
    --- GoldED/2 1.1.4.7+EMX
    * Origin: Roon's BBS - Budapest, HUNGARY (2:371/52)