IT_Architect
Verified User
- Joined
- Feb 27, 2006
- Messages
- 1,094
First of all, I don't care what port you pick for a default. I'll stick with it just to make the support experience go easier. Perhaps the thing to do is see what the other CPs are using, and if there is a defacto standard out there already.
If you have a HOW TO that works automatically when they add new FTP users, I'd love to try it. Anything that requires credentials needs to be encrypted.
Thanks!
Usually there is no easier way to secure a protocol than with TLS. However, there are two problems, the FTP protocol, and FTPS has so many standards, there are none. FTP without encryption has always had firewall and NAT problems. Firewalls had to build in smarts to monitor the conversation to know what ports to open. Once your run a pipe through the firewall, it can't monitor the conversation. My Dreamweaver sends the credentials, in the clear and then after things are set up, goes to secure. The reason they do that is because of the way firewalls interact with FTP, is they snoop the conversation, and determine from that which ports to open for the dynamic ports. If I'm sending credentials in the clear, it's nothing but an "exercise" because anybody can read the credentials, and log into the site I'm sending to. Some servers take a dim view of sending credentials in the clear, so I cannot connect with my Dreaweaver. Instead, what they do is permanently open a port range for ftp. Then there is triple c. What that does is secure authentication, and then puts the control channel in the clear so the firewall can pick up on what is going on, and open the ports necessary. The problem is not many clients support it, and mod_tils surely doesn't, so that throws out ProFTPD. Some servers try to adapt starting at the most secure and working their way down. FTPS requires multiple clients and some good fortune to make it work. If you connect easily, chances are it wasn't securely. Due to these complexities and much easier to secure protocols being available, I see FTP remaining for efficient unauthenticated access, and FTPS never getting much traction. With SSH/SFTP/SCP, it only works one way, no firewall dances, and any client you choose will work. However, I'm open to anything that doesn't give away credentials.From IT_Architect's comment:With FTPS, we know that the control channel (username/password) is secure.. However, I'm curious about your comment that the data channel not being secure. From a few quick googles, I wasn't able to find anything that says the data channel cannot be secured, only that it's optionally secured. Are you able to elaborate on this for us?
Awesome! Tonight, my Dad wanted to take all of us kids out to eat. I had a server go down while we were at the restaurant. Zabbix sent a text message to my phone, and I fixed it from the restaurant. Because the workplace has been redefined, the only responsible thing we can do is enforce secure communication. Why bother locking the doors with mod_ruid2 if we're going to allow our hosting customers and their employees to give away the keys to strangers? LOL! I'd like to force secure E-mail and SFTP at the same time to get this behind me.On a side-note, I've already got sftp working with proftpd on a test box. It does need a few weird proftpd.conf changes (setting "Port 0", adding Port 21 into a 0.0.0.0 VH) to make it bind to all IPs, but nothing drastic.
Worst case, I'll just write up a how-to guide.
If you have a HOW TO that works automatically when they add new FTP users, I'd love to try it. Anything that requires credentials needs to be encrypted.
Thanks!
Last edited: