140 lines
9.2 KiB
HTML
140 lines
9.2 KiB
HTML
|
<?xml version="1.0" encoding="UTF-8"?>
|
||
|
<!DOCTYPE html
|
||
|
PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
|
||
|
<html lang="en-us" xml:lang="en-us">
|
||
|
<head>
|
||
|
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
|
||
|
<meta name="security" content="public" />
|
||
|
<meta name="Robots" content="index,follow" />
|
||
|
<meta http-equiv="PICS-Label" content='(PICS-1.1 "http://www.icra.org/ratingsv02.html" l gen true r (cz 1 lz 1 nz 1 oz 1 vz 1) "http://www.rsac.org/ratingsv01.html" l gen true r (n 0 s 0 v 0 l 0) "http://www.classify.org/safesurf/" l gen true r (SS~~000 1))' />
|
||
|
<meta name="DC.Type" content="concept" />
|
||
|
<meta name="DC.Title" content="FTP security" />
|
||
|
<meta name="abstract" content="FTP (File Transfer Protocol) provides the capability of transferring files between a client (a user on another system) and your server." />
|
||
|
<meta name="description" content="FTP (File Transfer Protocol) provides the capability of transferring files between a client (a user on another system) and your server." />
|
||
|
<meta name="DC.Relation" scheme="URI" content="rzaj45zrscenario1risks.htm" />
|
||
|
<meta name="DC.Relation" scheme="URI" content="rzaj45zoemail.htm" />
|
||
|
<meta name="DC.Relation" scheme="URI" content="../rzalx/rzalxsecterms.htm" />
|
||
|
<meta name="DC.Relation" scheme="URI" content="../rzaja/rzajagetstart.htm" />
|
||
|
<meta name="DC.Relation" scheme="URI" content="rzaj40a0internetsecurity.htm" />
|
||
|
<meta name="DC.Relation" scheme="URI" content="../rzaub/rzaubkickoff.htm" />
|
||
|
<meta name="copyright" content="(C) Copyright IBM Corporation 1999, 2006" />
|
||
|
<meta name="DC.Rights.Owner" content="(C) Copyright IBM Corporation 1999, 2006" />
|
||
|
<meta name="DC.Format" content="XHTML" />
|
||
|
<meta name="DC.Identifier" content="rzaj45zpftpsolutions" />
|
||
|
<meta name="DC.Language" content="en-us" />
|
||
|
<!-- All rights reserved. Licensed Materials Property of IBM -->
|
||
|
<!-- US Government Users Restricted Rights -->
|
||
|
<!-- Use, duplication or disclosure restricted by -->
|
||
|
<!-- GSA ADP Schedule Contract with IBM Corp. -->
|
||
|
<link rel="stylesheet" type="text/css" href="./ibmdita.css" />
|
||
|
<link rel="stylesheet" type="text/css" href="./ic.css" />
|
||
|
<title>FTP security</title>
|
||
|
</head>
|
||
|
<body id="rzaj45zpftpsolutions"><a name="rzaj45zpftpsolutions"><!-- --></a>
|
||
|
<!-- Java sync-link --><script language="Javascript" src="../rzahg/synch.js" type="text/javascript"></script>
|
||
|
<h1 class="topictitle1">FTP security</h1>
|
||
|
<div><p>FTP (File Transfer Protocol) provides the capability of transferring
|
||
|
files between a client (a user on another system) and your server.</p>
|
||
|
<p>You can also use the remote command capability to submit commands to the
|
||
|
server. Consequently, FTP is very useful for working with remote systems,
|
||
|
or to move files between systems. However, the use of FTP across the Internet,
|
||
|
or other untrusted networks, exposes you to certain security risks. You must
|
||
|
understand these risks to ensure that your security policy describes how you
|
||
|
will minimize these risks.</p>
|
||
|
<ul><li>Your object authority scheme might not provide enough protection when
|
||
|
you allow FTP on your system. <p>For example, the public authority for your
|
||
|
objects may be *USE, but today you are preventing most users from accessing
|
||
|
those objects by using "menu security". (Menu security prevents users from
|
||
|
doing anything that is not one of their menu options.) Since FTP users are
|
||
|
not restricted to menus, they can read all objects on your system.</p>
|
||
|
<div class="p"><img src="./delta.gif" alt="Start of change" />Here
|
||
|
are some options for controlling this security risk: <ul><li>Put into effect full iSeries™ object security on the system (in other words,
|
||
|
change the system's security model from "menu security" to "object security."
|
||
|
This is your best, most secure option.</li>
|
||
|
<li>Write exit programs for FTP to restrict access to files which may be transferred
|
||
|
through FTP. These exit programs should provide security that is at least
|
||
|
the equivalent as the security that the menu program provide. Many customers
|
||
|
would probably want to make the FTP access controls even more restrictive.
|
||
|
This option only covers FTP, not other interfaces such as ODBC, DDM, or DRDA<sup>®</sup>. <div class="note"><span class="notetitle">Note:</span> *USE
|
||
|
authority to a file allows the user to download the file. *CHANGE authority
|
||
|
to a file allows the user to upload the file.</div>
|
||
|
</li>
|
||
|
</ul>
|
||
|
<img src="./deltaend.gif" alt="End of change" /></div>
|
||
|
</li>
|
||
|
<li>A hacker can mount a "denial of service" attack with your FTP server to
|
||
|
disable user profiles on the system. This is done by repeatedly attempting
|
||
|
to log on with an incorrect password for a user profile until the user profile
|
||
|
is disabled. This type of attack disables the profile if it reaches the maximum
|
||
|
sign on count of three. <p>What you can do to avoid this risk involves analyzing
|
||
|
the trade-offs that you are willing to make to increase security to minimize
|
||
|
the attack versus providing users with ease of access. The FTP server normally
|
||
|
enforces the QMAXSIGN system value to prevent a hacker from having unlimited
|
||
|
attempts to guess a password and therefore mount password attacks. Here are
|
||
|
some options that you should consider using:</p>
|
||
|
<ul><li>Use an FTP server logon exit program to reject logon requests by any system
|
||
|
user profiles and those user profiles that you designate not be allowed FTP
|
||
|
access. (When using such an exit program, logon attempts rejected by the
|
||
|
server logon exit point for the user profiles that you block do <strong>not</strong> get
|
||
|
counted against the profile's QMAXSIGN count.)</li>
|
||
|
<li>Use an FTP server logon exit program to limit the client machines from
|
||
|
which a given user profile is allowed to access the FTP server. For example,
|
||
|
if a person from Accounting is allowed FTP access, only allow that user profile
|
||
|
FTP server access from computers which have IP addresses in the Accounting
|
||
|
department.</li>
|
||
|
<li>Use an FTP server logon exit program to log the user name and IP address
|
||
|
of all FTP logon attempts. Review these logs regularly, and whenever a profile
|
||
|
is disabled by maximum password attempts, use the IP address information to
|
||
|
identify the perpetrator and take appropriate measures.</li>
|
||
|
<li><img src="./delta.gif" alt="Start of change" />Use the intrusion detection system to detect "denial of service"
|
||
|
attacks on the system.<img src="./deltaend.gif" alt="End of change" /></li>
|
||
|
</ul>
|
||
|
</li>
|
||
|
</ul>
|
||
|
<p>Additionally, you can use FTP server exit points to provide an anonymous
|
||
|
FTP function for guest users. Setting up a secure, anonymous FTP server requires
|
||
|
exit programs for both the FTP server logon <strong>and</strong> FTP server request
|
||
|
validation exit points.</p>
|
||
|
<p><img src="./delta.gif" alt="Start of change" />You can use the Secure Sockets Layer (SSL) to provide secure
|
||
|
communications sessions for your FTP server. Using SSL ensures that all FTP
|
||
|
transmissions are encrypted to maintain confidentiality for all data that
|
||
|
passes between the FTP server and the client, including user names and passwords.
|
||
|
The FTP server supports the use of digital certificates for client authentication
|
||
|
also.<img src="./deltaend.gif" alt="End of change" /></p>
|
||
|
<div class="p">To learn more about using FTP, its risks, and
|
||
|
the security measures available to you, review these resources: <ul><li><a href="../rzaiq/rzaiqrzaiqimplement.htm">Secure
|
||
|
FTP</a>.</li>
|
||
|
<li><a href=" ../rzaiq/rzaiqsslparent.htm">Use
|
||
|
SSL to secure the FTP server</a>.</li>
|
||
|
</ul>
|
||
|
</div>
|
||
|
<p><img src="./delta.gif" alt="Start of change" />In addition to these FTP options, you may want
|
||
|
to consider using Anonymous FTP to provide a convenient way for users to access
|
||
|
non-confidential material easily. Anonymous FTP enables unprotected access
|
||
|
(no password required) to selected information about a remote system. The
|
||
|
remote site determines what information is made available for general access.
|
||
|
Such information is considered to be publicly accessible and can be read by
|
||
|
anyone. Before configure Anonymous FTP, you should weigh the security risks
|
||
|
and consider securing your FTP server with exit programs.<img src="./deltaend.gif" alt="End of change" /></p>
|
||
|
<ul><li><a href="../rzaiq/rzaiqftpanon.htm">Configure
|
||
|
Anonymous FTP</a>.</li>
|
||
|
<li><a href="../rzaiq/rzaiqftpscon.htm">Manage
|
||
|
access using FTP exit programs</a>.</li>
|
||
|
</ul>
|
||
|
</div>
|
||
|
<div>
|
||
|
<div class="familylinks">
|
||
|
<div class="parentlink"><strong>Parent topic:</strong> <a href="rzaj45zrscenario1risks.htm" title="Use this information to learn about common Internet security risks for a number of popular Internet applications and services and measures that you can take to manage these risks.">Application security options</a></div>
|
||
|
</div>
|
||
|
<div class="relconcepts"><strong>Related concepts</strong><br />
|
||
|
<div><a href="rzaj45zoemail.htm" title="Using e-mail across the Internet or other untrusted network imposes security risks against which using a firewall may not protect.">E-mail security</a></div>
|
||
|
<div><a href="../rzaja/rzajagetstart.htm">Virtual private network (VPN)</a></div>
|
||
|
<div><a href="rzaj40a0internetsecurity.htm" title="Your security policy defines what you want to protect and what you expect of your system users.">The layered defense approach to security</a></div>
|
||
|
<div><a href="../rzaub/rzaubkickoff.htm">Intrusion detection</a></div>
|
||
|
</div>
|
||
|
<div class="relref"><strong>Related reference</strong><br />
|
||
|
<div><a href="../rzalx/rzalxsecterms.htm">Security terminology</a></div>
|
||
|
</div>
|
||
|
</div>
|
||
|
</body>
|
||
|
</html>
|