Re: How safe are FTP servers?



Sylvain Robitaille <syl@xxxxxxxxxxxxxxxxxx> (07-05-21 04:26:54):

You should at least force SSL and authenticate that way. FTP is the
worst protocol to send files through.

Many would disagree with you on that. FTP was _designed_ for
transferring files, after all. It *is*, however, the worst protocol
to send user authentication through ...

I'm unable to find a worse protocol. Unclear specifications (like how
to interpret file listings) and a nightmare for firewalled hosts.
Further it is pretty limited by itself. You will do a lot of useful
stuff through extensions, and that's bad either.

It was designed for that purpose when there were no other general
purpose alternatives, but it's showing its age already.


Regards,
Ertugrul Söylemez.


--
Security is the one concept, which makes things in your life stay as
they are. Otto is a man, who is afraid of changes in his life; so
naturally he does not employ security.
.



Relevant Pages

  • Re: Protocol Analysis
    ... Subject: Protocol Analysis ... Concerned about Web Application Security? ... testing and vulnerability management needs. ... most comprehensive solutions to meet your application security penetration ...
    (Pen-Test)
  • [fw-wiz] UNSUBSCRIBE
    ... (Paul D. Robertson) ... > fixup protocol icmp error ... >> isn't about the security properties of the control, ... errors in the firewall, configuration errors, and it then takes physical ...
    (Firewall-Wizards)
  • Protocols of the Elders o
    ... Protocol Number 16: Brainwashing ... We must introduce into their education ... The study of practical life, ... in no wise generalizing the teaching. ...
    (comp.lang.java.gui)
  • Re: 802.11i
    ... Access" and it is security "system" for wireless networks that employs ... While TKIP "Temporal Key Integrity Protocol" is actual protocol under ... safer to communicate using RC4 stream cipher, ... But that is WPA v1., which is done to be as an enhancement ...
    (Security-Basics)
  • RE: Ambiguities in TCP/IP - firewall bypassing
    ... T/TCP does indeed require multiple flags to be set ... simultaneously, however, it's also not a proven protocol. ... There's also a clear security issue with allowing one side of the ... standard TCP/IP it's relatively easy to spoof the source IP for the SYN ...
    (Bugtraq)