<?xml version="1.0" encoding="utf-8" ?><rss version="2.0" xml:base="https://www.webmaster-forums.net/crss/node/1014935" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel>
    <title></title>
    <link>https://www.webmaster-forums.net/crss/node/1014935</link>
    <description></description>
    <language>en</language>
          <item>
    <title></title>
    <link>https://www.webmaster-forums.net/server-management/mandrake-ftp-problems#comment-1086104</link>
    <description> &lt;p&gt;The Linksys router uses NAT, which is good. Are you allowing anon FTP or requiring a login? I assume that you have only port 21 open for ftp. &lt;/p&gt;
&lt;p&gt;Here are some good ways to secure FTP;&lt;/p&gt;
&lt;ul class=&quot;bb-list&quot;&gt;
&lt;li&gt;&lt;strong&gt;/etc/ftpusers&lt;/strong&gt; - this is a restricted access file. Any user whose name appears here will be denied access. You should add an entry for all of your system login services, root, bin, daemon, mail, nobody, etc to prevent someone logging on with that account.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;/etc/ftphosts&lt;/strong&gt; - this file can be used to prevent access via a specified host.&lt;br /&gt;
&lt;strong&gt;&lt;em&gt;Example:&lt;br /&gt;
allow mhensler mhensler.com&lt;br /&gt;
deny mairving *mairving.com&lt;/em&gt;&lt;/strong&gt;&lt;br /&gt;
Look at man ftphosts for more info.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;/etc/ftpaccess&lt;/strong&gt; - use this file to control how ftpd works.&lt;br /&gt;
&lt;strong&gt;&lt;em&gt;Example:&lt;br /&gt;
class   all   real,guest,anonymous *&lt;br /&gt;
email root@localhost&lt;br /&gt;
loginfails 3&lt;br /&gt;
readme README* login&lt;br /&gt;
readme README* cwd=*&lt;br /&gt;
message /welcome.msg            login&lt;br /&gt;
message  .message               cwd=*&lt;br /&gt;
compress        yes         all&lt;br /&gt;
tar             yes         all&lt;br /&gt;
chmod           no          guest, anonymous&lt;br /&gt;
delete          no          guest, anonymous&lt;br /&gt;
overwrite       no          guest, anonymous&lt;br /&gt;
rename          no          guest, anonymous&lt;br /&gt;
log transfers anonymous,real inbound,outbound&lt;br /&gt;
shutdown /etc/shutmsg&lt;br /&gt;
passwd-check rfc822 warn&lt;/em&gt;&lt;/strong&gt;&lt;br /&gt;
Here is some info on the various directives.&lt;br /&gt;
&lt;strong&gt;class&lt;/strong&gt; - Used to define special classes of users.&lt;br /&gt;
&lt;strong&gt;loginfails&lt;/strong&gt; - Number of bad login attempts before a message is sent to logs.&lt;br /&gt;
&lt;strong&gt;Other directives like compress, tar, chmod, delete, overwrite, rename&lt;/strong&gt; - in the above example, anyone can upload or download a tar file. Any user besides guest &amp;amp; anonymous can chmod a file.&lt;/li&gt;
&lt;li&gt;Additional user security - Set the users home directory to 555 with root ownership.&lt;/li&gt;
&lt;li&gt;Additional security issues - ftp is insecure in itself for a couple of reasons. One is that passwords are sent in plain text. So you have to look at security as preventin those users from doing any damage to your system.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Here is a draft focusing on ftp security that may help:&lt;/p&gt;
&lt;p&gt;----------draft-allman-ftp-sec-consider-01.txt--------------&lt;/p&gt;
&lt;p&gt;Internet Engineering Task Force                              Mark Allman&lt;br /&gt;
INTERNET DRAFT                                           Shawn Ostermann&lt;br /&gt;
File: draft-allman-ftp-sec-consider-01.txt               Ohio University&lt;br /&gt;
                                                        January 21, 1997&lt;br /&gt;
                                                  Expires: June 21, 1997&lt;/p&gt;
&lt;p&gt;                      FTP Security Considerations&lt;/p&gt;
&lt;p&gt;Status of this Memo&lt;/p&gt;
&lt;p&gt;    This document is an Internet-Draft.  Internet-Drafts are working&lt;br /&gt;
    documents of the Internet Engineering Task Force (IETF), its areas,&lt;br /&gt;
    and its working groups.  Note that other groups may also distribute&lt;br /&gt;
    working documents as Internet-Drafts.&lt;/p&gt;
&lt;p&gt;    Internet-Drafts are draft documents valid for a maximum of six&lt;br /&gt;
    months and may be updated, replaced, or obsoleted by other documents&lt;br /&gt;
    at any time.  It is inappropriate to use Internet-Drafts as&lt;br /&gt;
    reference material or to cite them other than as ``work in&lt;br /&gt;
    progress.´&#039;&lt;/p&gt;
&lt;p&gt;    To learn the current status of any Internet-Draft, please check the&lt;br /&gt;
    ``1id-abstracts.txt´&#039; listing contained in the Internet- Drafts&lt;br /&gt;
    Shadow Directories on ftp.is.co.za (Africa), nic.nordu.net (Europe),&lt;br /&gt;
    munnari.oz.au (Pacific Rim), ds.internic.net (US East Coast), or&lt;br /&gt;
    ftp.isi.edu (US West Coast).&lt;/p&gt;
&lt;p&gt;Abstract&lt;/p&gt;
&lt;p&gt;    The specification for the File Transfer Protocol contains a number&lt;br /&gt;
    of mechanisms that can be used to compromise network security.  The&lt;br /&gt;
    FTP specification allows a client to instruct a server to transfer&lt;br /&gt;
    files to a third machine.  This third-party mechanism, known as&lt;br /&gt;
    proxy FTP, causes a well known security problem.  The FTP&lt;br /&gt;
    specification also allows an unlimited number of attempts at&lt;br /&gt;
    entering a user´s password.  This allows brute force &quot;password&lt;br /&gt;
    guessing&quot; attacks.  This document provides suggestions for system&lt;br /&gt;
    administrators and those implementing FTP servers that will decrease&lt;br /&gt;
    the security problems associated with FTP.&lt;/p&gt;
&lt;p&gt;1   Introduction&lt;/p&gt;
&lt;p&gt;    The File Transfer Protocol specification [PR85] provides a mechanism&lt;br /&gt;
    that allows a client to establish a data connection and transfer a&lt;br /&gt;
    file between two FTP servers.  This &quot;proxy FTP&quot; mechanism can be&lt;br /&gt;
    used to decrease the amount of traffic on the network; the client&lt;br /&gt;
    instructs one server to transfer a file to another server, rather&lt;br /&gt;
    than transfering the file from the first server to the client and&lt;br /&gt;
    then from the client to the second server.  This is particularly&lt;br /&gt;
    useful when the client connects to the network using a slow link&lt;br /&gt;
    (e.g., a modem).  While useful, proxy FTP also provides a security&lt;br /&gt;
    problem, known as a &quot;bounce attack&quot;.  In addition to the bounce&lt;/p&gt;
&lt;p&gt;Expires: June 21, 1997                                          [Page 1]&lt;br /&gt;
--------------------------------------------------------------------------------&lt;br /&gt;
draft-allman-ftp-sec-consider-01.txt                    January 21, 1997&lt;/p&gt;
&lt;p&gt;    attack, FTP servers can be used by attackers to guess passwords&lt;br /&gt;
    using brute force.&lt;/p&gt;
&lt;p&gt;    This paper provides information for FTP server implementers and&lt;br /&gt;
    system administrators, as follows.  Section 2 describes the FTP&lt;br /&gt;
    &quot;bounce attack&quot;.  Section 3 provides suggestions for minimizing the&lt;br /&gt;
    bounce attack.  Section 4 provides suggestions for servers which&lt;br /&gt;
    limit access based on network address.  Finally, section 5 provides&lt;br /&gt;
    recommendations for limiting brute force &quot;password guessing&quot; by&lt;br /&gt;
    clients.&lt;/p&gt;
&lt;p&gt;2   The Bounce Attack&lt;/p&gt;
&lt;p&gt;    The version of FTP specified in the standard [PR85] provides a&lt;br /&gt;
    method for attacking well known network servers, while making the&lt;br /&gt;
    perpetrators difficult to track down.  The attack involves sending&lt;br /&gt;
    an FTP &quot;PORT&quot; command to an FTP server containing the network&lt;br /&gt;
    address and the port number of the machine and service being&lt;br /&gt;
    attacked.  At this point, the original client can instruct the FTP&lt;br /&gt;
    server to send a file to the service being attacked.  Such a file&lt;br /&gt;
    would contain commands relevant to the service being attacked (SMTP,&lt;br /&gt;
    NNTP, etc.).  Instructing a third party to connect to the service,&lt;br /&gt;
    rather than connecting directly, makes tracking down the perpetrator&lt;br /&gt;
    difficult and can circumvent network address based access&lt;br /&gt;
    restrictions.&lt;/p&gt;
&lt;p&gt;    As an example, a client uploads a file containing SMTP commands to&lt;br /&gt;
    an FTP server.  Then, using an appropriate PORT command, the client&lt;br /&gt;
    instructs the server to open a connection to a third machine´s SMTP&lt;br /&gt;
    port.  Finally, the client instructs the server to transfer the&lt;br /&gt;
    uploaded file containing SMTP commands to the third machine.  This&lt;br /&gt;
    allows the client to forge mail on the third machine without making&lt;br /&gt;
    a direct connection.  This makes it difficult to track attackers.&lt;/p&gt;
&lt;p&gt;3   Protecting Against the Bounce Attack&lt;/p&gt;
&lt;p&gt;    The original FTP specification [PR85] assumes that data connections&lt;br /&gt;
    will be made using the Transmission Control Protocol (TCP) [Pos81].&lt;br /&gt;
    TCP port numbers in the range 0 - 1023 are reserved for well known&lt;br /&gt;
    services such as mail, network news and FTP control connections&lt;br /&gt;
    [RP94].  The FTP specification makes no restrictions on the TCP port&lt;br /&gt;
    number used for the data connection.  Therefore, using proxy FTP,&lt;br /&gt;
    clients have the ability to tell the server to attack a well known&lt;br /&gt;
    service on any machine.&lt;/p&gt;
&lt;p&gt;    To avoid such bounce attacks, it is SUGGESTED that servers not open&lt;br /&gt;
    data connections to TCP ports less than 1024.  If a server receives&lt;br /&gt;
    a PORT command containing a TCP port number less than 1024, the&lt;br /&gt;
    SUGGESTED response is 504 (defined as &quot;Command not implemented for&lt;br /&gt;
    that parameter&quot; by [PR85]).  Note this leaves non-well known servers&lt;br /&gt;
    (those running on ports greater than 1023) vulnerable to bounce&lt;br /&gt;
    attacks. &lt;/p&gt;
&lt;p&gt;Expires: June 21, 1997                                          [Page 2]&lt;br /&gt;
--------------------------------------------------------------------------------&lt;br /&gt;
draft-allman-ftp-sec-consider-01.txt                    January 21, 1997&lt;/p&gt;
&lt;p&gt;    Several proposals (e.g., [AO96] and [Pis94]) provide a mechanism&lt;br /&gt;
    that would allow data connections to be made using a transport&lt;br /&gt;
    protocol other than TCP.  Similar precautions should be taken to&lt;br /&gt;
    protect well known services when using these protocols.&lt;/p&gt;
&lt;p&gt;4   Restricted Access&lt;/p&gt;
&lt;p&gt;    For some FTP servers, it is desirable to restrict access based on&lt;br /&gt;
    network address.  For example, a server might want to restrict&lt;br /&gt;
    access to certain files from certain places (e.g., a certain file&lt;br /&gt;
    should not be transferred out of an organization).  In such a&lt;br /&gt;
    situation, the server SHOULD confirm that the network address of the&lt;br /&gt;
    remote hosts on both the control connection and the data connection&lt;br /&gt;
    are within the organization before sending a restricted file.  By&lt;br /&gt;
    checking both connections, a server is protected against the case&lt;br /&gt;
    when the control connection is established with a trusted host and&lt;br /&gt;
    the data connection is not.  Note that restricting access based on&lt;br /&gt;
    network address leaves the FTP server vulernable to &quot;spoof&quot; attacks.&lt;br /&gt;
    In a spoof attack, for example, an attacking machine could assume&lt;br /&gt;
    the host address of another machine inside an organization and&lt;br /&gt;
    download files that are not accessible from outside the&lt;br /&gt;
    organization.&lt;/p&gt;
&lt;p&gt;5   Protecting Passwords &lt;/p&gt;
&lt;p&gt;    To minimize the risk of brute force password guessing through the&lt;br /&gt;
    FTP server, it is SUGGESTED that servers limit the number of&lt;br /&gt;
    attempts which can be made at sending a correct password.  After a&lt;br /&gt;
    small number of attempts (3-5), the server SHOULD close the control&lt;br /&gt;
    connection with the client.  In addition, it is SUGGESTED that the&lt;br /&gt;
    server impose a 5 second delay before replying to an invalid &quot;PASS&quot;&lt;br /&gt;
    command.  If available, mechanisms already provided by the target&lt;br /&gt;
    operating system should be used to implement the above suggestions.&lt;/p&gt;
&lt;p&gt;    Standard FTP [PR85] sends passwords in clear text using the &quot;PASS&quot;&lt;br /&gt;
    command.  It is SUGGESTED that FTP clients and servers use alternate&lt;br /&gt;
    authentication mechanisms that are not subject to eavesdropping&lt;br /&gt;
    (such as the mechanisms being developed by the IETF Common&lt;br /&gt;
    Authentication Technology Working Group [HL96]).&lt;/p&gt;
&lt;p&gt;6   Conclusion&lt;/p&gt;
&lt;p&gt;    Using the above suggestions can decrease the security problems&lt;br /&gt;
    associated with FTP servers without eliminating functionality.&lt;/p&gt;
&lt;p&gt;Acknowledgments&lt;/p&gt;
&lt;p&gt;    We would like to thank Alex Belits, Jim Bound, William Curtin,&lt;br /&gt;
    Robert Elz, Paul Hethmon, Alun Jones and Stephen Tihor for their&lt;br /&gt;
    helpful comments on this paper.&lt;/p&gt;
&lt;p&gt;Expires: June 21, 1997                                          [Page 3]&lt;br /&gt;
--------------------------------------------------------------------------------&lt;br /&gt;
draft-allman-ftp-sec-consider-01.txt                    January 21, 1997&lt;/p&gt;
&lt;p&gt;References&lt;/p&gt;
&lt;p&gt;    [AO96] Mark Allman and Shawn Ostermann.  FTP Extensions for Variable&lt;br /&gt;
        Protocol Specification, November 1996.  I-D&lt;br /&gt;
        draft-allman-ftp-variable-03.txt (work in progress).&lt;/p&gt;
&lt;p&gt;    [HL96] M. Horowitz and S. J. Lunt.  FTP Security Extensions,&lt;br /&gt;
        November 1996.  I-D draft-ietf-cat-ftpsec-09.txt (work in&lt;br /&gt;
        progress).&lt;/p&gt;
&lt;p&gt;    [Pis94] D. Piscitello.  FTP Operation Over Big Address Records&lt;br /&gt;
        (FOOBAR), June 1994.  RFC 1639.&lt;/p&gt;
&lt;p&gt;    [Pos81] J. Postel.  Transmission Control Protocol, September 1981.&lt;br /&gt;
        RFC 793.&lt;/p&gt;
&lt;p&gt;    [PR85] J. Postel and J. Reynolds.  File Transfer Protocol (FTP),&lt;br /&gt;
        October 1985.  RFC 959.&lt;/p&gt;
&lt;p&gt;    [RP94] J. Reynolds and J. Postel.  Assigned Numbers, October 1994.&lt;br /&gt;
        RFC 1700.&lt;/p&gt;
&lt;p&gt;Author´s Addresses:&lt;/p&gt;
&lt;p&gt;    Mark Allman and Shawn Ostermann&lt;br /&gt;
    School of Electrical Engineering and Computer Science&lt;br /&gt;
    Ohio University&lt;br /&gt;
    416 Morton Hall&lt;br /&gt;
    Athens, OH  45701&lt;br /&gt;
    &lt;a href=&quot;mailto:mallman@cs.ohiou.edu&quot; class=&quot;bb-email&quot;&gt;mallman@cs.ohiou.edu&lt;/a&gt;&lt;br /&gt;
    &lt;a href=&quot;mailto:ostermann@cs.ohiou.edu&quot; class=&quot;bb-email&quot;&gt;ostermann@cs.ohiou.edu&lt;/a&gt;&lt;br /&gt;
------------------------------------------------------------&lt;/p&gt;
 </description>
     <pubDate>Fri, 27 Jul 2001 14:32:41 +0000</pubDate>
 <dc:creator>mairving</dc:creator>
 <guid isPermaLink="false">comment 1086104 at https://www.webmaster-forums.net</guid>
  </item>
  <item>
    <title></title>
    <link>https://www.webmaster-forums.net/server-management/mandrake-ftp-problems#comment-1086073</link>
    <description> &lt;p&gt;The FTP was slow connecting, and browsing folders.  I don&#039;t remember how it was downloading/uploading files.&lt;/p&gt;
&lt;p&gt;I think I&#039;m using a &#039;medium&#039; security.  I am behind a Linksys router, with a build in firewall.  Is that sufficient?&lt;/p&gt;
&lt;p&gt;Would you recommend using inetd over the standalone?&lt;/p&gt;
 </description>
     <pubDate>Fri, 27 Jul 2001 04:41:34 +0000</pubDate>
 <dc:creator>Mark Hensler</dc:creator>
 <guid isPermaLink="false">comment 1086073 at https://www.webmaster-forums.net</guid>
  </item>
  <item>
    <title></title>
    <link>https://www.webmaster-forums.net/server-management/mandrake-ftp-problems#comment-1086071</link>
    <description> &lt;p&gt;I am not sure what is causing your slowdown. What kind of connection are you on? Is it slow on connecting or slow to upload/download. The ftp daemon doesn&#039;t degrade over time either. I really can&#039;t tell that much difference between the two. &lt;/p&gt;
&lt;p&gt;The &lt;strong&gt;inetd&lt;/strong&gt; daemon is a so called super daemon. So rather than loading ftp, telnet, tcp, udp separately, it would load them as one super daemon. The only real advantage to having a separate ftp daemon would be that you could start and stop it without having to kill all of the other processes. As far as providing you with some examples, I not running a ftp server. I will check around and see what I can come up with. &lt;/p&gt;
&lt;p&gt;What kind of security will you be setting up on it? If you need a nice firewall, try &lt;a href=&quot;http://www.bastille-linux.org/&quot; class=&quot;bb-url&quot;&gt;&lt;strong&gt;Bastille Linux&lt;/strong&gt;&lt;/a&gt;. I believe that it comes on the Mandrake 8.0 CD. It will do a lot towards securing your box.&lt;/p&gt;
 </description>
     <pubDate>Fri, 27 Jul 2001 02:45:07 +0000</pubDate>
 <dc:creator>mairving</dc:creator>
 <guid isPermaLink="false">comment 1086071 at https://www.webmaster-forums.net</guid>
  </item>
  <item>
    <title></title>
    <link>https://www.webmaster-forums.net/server-management/mandrake-ftp-problems#comment-1086057</link>
    <description> &lt;p&gt;Also, I&#039;ve been reading lots of docs on configuring both proftpd an wu-ftpd, and it seems that there are two ways to configure FTP servers.  Some show configs for a server using Inetd and other using Standalone.&lt;/p&gt;
&lt;p&gt;I&#039;ll be hosting about 5 low traffic personal sites.  Which would be better for me?&lt;/p&gt;
&lt;p&gt;PS: Working personal config examples would be &lt;strong&gt;much&lt;/strong&gt; appreciated.&lt;/p&gt;
 </description>
     <pubDate>Fri, 27 Jul 2001 00:06:34 +0000</pubDate>
 <dc:creator>Mark Hensler</dc:creator>
 <guid isPermaLink="false">comment 1086057 at https://www.webmaster-forums.net</guid>
  </item>
  </channel>
</rss>
