Please take time to read the conversation you are referencing. I suggested SFTP. Jeff was not comfortable giving everyone who currently has ftp access, full SSH access. I happened to agree with Jeff. Jeff knew that SFTP was part of the SSH2 protocol, that's why he raised the issue. I assured him that ProFTPD does not implement the secure terminal portion of the protocol.
Next, DA decided to evaluate SFTP as a possible solution. Since SFTP is the file transport element of the ssh2 standard, we couldn't have sshd, which implements the full protocol, and ProFTPD, which implements only SFTP & SCP portions, running on the same native port 22. All John was looking for is consensus on a default port for DA. I threw out my idea, which was a high port for SSHD, and I thought initially that John came back with proposing 23 for SSHD, because it was the old Telnet port, and 22 for SFTP, because it is the default in SFTP clients, and because people often hide their SSHD anyway. John then clarified it as he meant the other way around, at which point I stated, I don't care where you put it. There was no contention between John and I on that issue.
Hello I understand where you are coming from and your point, but for clarity, All I was doing in my post was agreeing that the default port should not be changed and offering scenarios of why it shouldnt be changed by default... you immediately started arguing with me about it, a little unclear as to why since you yourself in this reply admitted you dont care where it is located... so maybe your reply should have been to me hey DA admin had already decided to leave ssh on port 22... since I obviously missed that when reading the topic.
The thread was getting off into different operating systems and everything along the way. That was simply a request to refocus and summarize to give DA something they could use to work with. The summarization in the last two posts brings order and clarity to your recommendations.
I agree it was getting off track, but not because of different operating systems or what not... it is important when making decisions like this to take all scenarios/deployments into account. And as such anyone requesting a feature can and should be presented in options during install just like I stated above. Choose 1) SFTP & FTP 2) SFTP 3)FTP... Choose 1) IMAP enable plain text auth ports and TLS auth ports 2) enable only tls auth ports ..... you get the picture.... you sort of jumped to conclusions on what I was requesting... obviously my use case wont match yours or the next guys... it seems to me you got mad that I would even suggest a SFTP only option as if because you need SFTP+FTP thats how it should be and there should'nt be a additonal option for just SFTP... thats how you came off when you started arguing about it
When I make a counter point, comment, ask a question, or express an opinion, or even disagree, that is discussion. That does not constitute an attack. If someone makes a statement of opinion or position, it implies the right of others to challenge it, and for the person making the statement to be able to defend it with rationale. Earlier in this thread, John challenged me on my statements concerning FTPS security. I did not consider that an attack, but as the one who made the statement, I did owe him and everyone else an explanation of my rationale so they could judge for themselves if they agree with my rationale. There is no expectation for anyone to know everything or be right every time. I would not lose face if John proved me wrong, I would learn by it, and thank him.
I agree but maybe you dont understand the power of the words you chose to use, if you read the difference between johns challenges to you and your challenges to me they are very much different
No one has attacked you, nor have I discredited anything you've written. You have attacked me without cause. I stated in the beginning of the thread that I don't care which port they choose for the default, and that wherever they put it, I'd probably go with it on our systems. The only positions that I've maintained in all of this were secure credentials, the ability to maintain the same virtual user security structure for SFTP as we have today for FTP, and as per Jeff's suggestion, maintaining the same control we have today over whether or not to enable secure terminal for users.
Which my proposed solution did allow for all that so I am still confused here.
Referencing back to my post here
http://www.directadmin.com/forum/showthread.php?t=43504&p=222390#post222390
the words you chose to use:
What practical recommendations do you have for DA to solve this problem that would be the least disruptive to their customer base?
is a very powerful statement and many people reading it will take it as you discrediting my contributions... What you have wrote implies that my recommendations are disruptive to DA's customer base... It also implies that my recommendations were not practical... Which niether is true if you read my summary post
This statement is an attack, not productive in any way shape or form.
Also reading any of those posts I do not see where I have attacked you... there is only one post there where I wrote I disagree with this... didnt you yourself just say it is okay to disagree?
Just because me or anyone else raises a different idea to make the system secure... doesnt mean they are requesting that it be the default method... its just an idea to add as an option... I might like my system to be SFTP only... you might like your system to be SFTP+FTP... it is all just suggestions that are all controllable via options... You took my post as if I was saying do away with FTP and only use SFTP... but no where did I state that... you actually got quite upset with me about it and me asking for port 22 to NOT be changed from the default.... you were not presenting that as on option were were actually quite clear in your request that it should be changed by default... which is why DA admin staff told you no they will not mess with port 22 if it is use. Again anything requested in this thread should be presented as an option otherwise you could be disruptive to others business models and that is all I was pointing out to you.
And regards to SSH you presented a question for information, you cant argue with me because I told you what others are doing... if you dont want to provide shell access to your users using those methods or cant, then dont, all I was saying is dont change the default because there are those of us that do.
Regardless, like I said many times in my posts, we all have the same goal in mind here, and that is making the default install of Directadmin more secure, presenting options for users who have different use cases, not disrupting the way others do business, and working together to come up with the best solution that meets everyones needs if possible.