Not sure exactly what you are asking:
There is a version of proftpd for SCO, so you could download and install that.
If you are wanting to configure the SCO ftp server to provide similar results then you could follow the following directions. How do I set up guest ftp on SCO OpenServer 5.0.x?
Thank jgt.
but the problem not is around the installation of FTP Server with GUEST ACC,
the problem is around some time delay on welcome message.
and the mentioned solution works with proftpd, but I don't have it installed, I have the ftp server native to SCO and I can't find a .conf file to put the solution; then how is such configuration done in the native FTP of SCO.
yes, i have this like ... but i dont know much around config this:
# @(#)$Id: inetd.conf,v 6.8 1996/01/09 21:48:54 aes Exp $ - STREAMware TCP/
IP source
#
# Copyrighted as an unpublished work.
# (c) Copyright 1987-1994 Legent Corporation
# All rights reserved.
#
# SCCS IDENTIFICATION
ftp stream tcp nowait root /etc/ftpd ftpd -a
telnet stream tcp nowait NOLUID /etc/telnetd telnetd
shell stream tcp nowait NOLUID /etc/rshd rshd
login stream tcp nowait NOLUID /etc/rlogind rlogind
exec stream tcp nowait NOLUID /etc/rexecd rexecd
finger stream tcp nowait nouser /etc/fingerd fingerd
#uucp stream tcp nowait NOLUID /usr/lib/uucp/uucpd uucpd
# Enabling this allows public read files to be accessed via TFTP.
#tftp dgram udp wait nouser /etc/tftpd tftpd
# This is the more secure method, since only files from /tftpboot can
# be accessed via TFTP. This must be root in order to do the chroot
# to /tftpboot. /tftpboot must be created by hand.
#tftp dgram udp wait root /etc/tftpd tftpd -s /tftpboot
comsat dgram udp wait root /etc/comsat comsat
ntalk dgram udp wait nouser /etc/talkd talkd
#
# Entries for BOOTP and DHCP servers & relay agent
#
# If running tftpd in secure mode, use bootpd with "-c securedir"
# where securedir is the argument to tftpd -s.
#
# To run bootpd by itself, use:
#bootps dgram udp wait root /etc/bootpd bootpd
#
# To run dhcpd by itself, use:
#bootps dgram/i udp wait root /etc/dhcpd dhcpd
#
# When running dhcpd and bootpd, bootpd must be run in "slave mode" (with the
# -S option). In this mode, bootpd listens on an alternate port. The port
# bootps-alt is defined to be 950 in /etc/services, but it can be anything
# < 1024. To run dhcpd and bootpd, use the following two lines:
#bootps dgram/i udp wait root /etc/dhcpd dhcpd -b bootps-alt
#bootps-alt dgram udp wait root /etc/bootpd bootpd -S
#
# To run the BOOTP/DHCP relay agent bootpgw, use:
#bootps dgram/i udp wait root /etc/bootpgw bootpgw server-name
tcpmux stream tcp nowait root internal
echo stream tcp nowait root internal
discard stream tcp nowait root internal
chargen stream tcp nowait root internal
daytime stream tcp nowait root internal
time stream tcp nowait root internal
echo dgram udp wait root internal
discard dgram udp wait root internal
chargen dgram udp wait root internal
daytime dgram udp wait root internal
time dgram udp wait root internal
pop3 stream tcp nowait root /etc/popper popper
imap stream tcp nowait root /etc/imapd imapd
ftpd is the Internet File Transfer Protocol server process. The
server uses the TCP protocol and listens at the port specified in
the ftp service specification; see services(SFF).
ftpd is started by the super server inetd, and therefore must
have an entry in inetd's configuration file, /etc/inetd.conf. See
inetd(ADMN) and inetd.conf(SFF).
-a
Specify that the access file, /etc/ftpaccess, must be
present. This is the default behavior.
I have not much experience with ftpaccess. Man page is available though.
Further, I am not sure about your intentions.
If you want to make ftp more secure, then identd (port 113) does not help much. Maybe you can use sftp that is based on the much safer openssh.