ibm-information-center/dist/eclipse/plugins/i5OS.ic.rzaj4_5.4.0.1/rzaj45zpftpsolutions.htm

140 lines
9.2 KiB
HTML
Raw Normal View History

2024-04-02 14:02:31 +00:00
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE html
PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html lang="en-us" xml:lang="en-us">
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8" />
<meta name="security" content="public" />
<meta name="Robots" content="index,follow" />
<meta http-equiv="PICS-Label" content='(PICS-1.1 "http://www.icra.org/ratingsv02.html" l gen true r (cz 1 lz 1 nz 1 oz 1 vz 1) "http://www.rsac.org/ratingsv01.html" l gen true r (n 0 s 0 v 0 l 0) "http://www.classify.org/safesurf/" l gen true r (SS~~000 1))' />
<meta name="DC.Type" content="concept" />
<meta name="DC.Title" content="FTP security" />
<meta name="abstract" content="FTP (File Transfer Protocol) provides the capability of transferring files between a client (a user on another system) and your server." />
<meta name="description" content="FTP (File Transfer Protocol) provides the capability of transferring files between a client (a user on another system) and your server." />
<meta name="DC.Relation" scheme="URI" content="rzaj45zrscenario1risks.htm" />
<meta name="DC.Relation" scheme="URI" content="rzaj45zoemail.htm" />
<meta name="DC.Relation" scheme="URI" content="../rzalx/rzalxsecterms.htm" />
<meta name="DC.Relation" scheme="URI" content="../rzaja/rzajagetstart.htm" />
<meta name="DC.Relation" scheme="URI" content="rzaj40a0internetsecurity.htm" />
<meta name="DC.Relation" scheme="URI" content="../rzaub/rzaubkickoff.htm" />
<meta name="copyright" content="(C) Copyright IBM Corporation 1999, 2006" />
<meta name="DC.Rights.Owner" content="(C) Copyright IBM Corporation 1999, 2006" />
<meta name="DC.Format" content="XHTML" />
<meta name="DC.Identifier" content="rzaj45zpftpsolutions" />
<meta name="DC.Language" content="en-us" />
<!-- All rights reserved. Licensed Materials Property of IBM -->
<!-- US Government Users Restricted Rights -->
<!-- Use, duplication or disclosure restricted by -->
<!-- GSA ADP Schedule Contract with IBM Corp. -->
<link rel="stylesheet" type="text/css" href="./ibmdita.css" />
<link rel="stylesheet" type="text/css" href="./ic.css" />
<title>FTP security</title>
</head>
<body id="rzaj45zpftpsolutions"><a name="rzaj45zpftpsolutions"><!-- --></a>
<!-- Java sync-link --><script language="Javascript" src="../rzahg/synch.js" type="text/javascript"></script>
<h1 class="topictitle1">FTP security</h1>
<div><p>FTP (File Transfer Protocol) provides the capability of transferring
files between a client (a user on another system) and your server.</p>
<p>You can also use the remote command capability to submit commands to the
server. Consequently, FTP is very useful for working with remote systems,
or to move files between systems. However, the use of FTP across the Internet,
or other untrusted networks, exposes you to certain security risks. You must
understand these risks to ensure that your security policy describes how you
will minimize these risks.</p>
<ul><li>Your object authority scheme might not provide enough protection when
you allow FTP on your system. <p>For example, the public authority for your
objects may be *USE, but today you are preventing most users from accessing
those objects by using "menu security". (Menu security prevents users from
doing anything that is not one of their menu options.) Since FTP users are
not restricted to menus, they can read all objects on your system.</p>
<div class="p"><img src="./delta.gif" alt="Start of change" />Here
are some options for controlling this security risk: <ul><li>Put into effect full iSeries™ object security on the system (in other words,
change the system's security model from "menu security" to "object security."
This is your best, most secure option.</li>
<li>Write exit programs for FTP to restrict access to files which may be transferred
through FTP. These exit programs should provide security that is at least
the equivalent as the security that the menu program provide. Many customers
would probably want to make the FTP access controls even more restrictive.
This option only covers FTP, not other interfaces such as ODBC, DDM, or DRDA<sup>®</sup>. <div class="note"><span class="notetitle">Note:</span> *USE
authority to a file allows the user to download the file. *CHANGE authority
to a file allows the user to upload the file.</div>
</li>
</ul>
<img src="./deltaend.gif" alt="End of change" /></div>
</li>
<li>A hacker can mount a "denial of service" attack with your FTP server to
disable user profiles on the system. This is done by repeatedly attempting
to log on with an incorrect password for a user profile until the user profile
is disabled. This type of attack disables the profile if it reaches the maximum
sign on count of three. <p>What you can do to avoid this risk involves analyzing
the trade-offs that you are willing to make to increase security to minimize
the attack versus providing users with ease of access. The FTP server normally
enforces the QMAXSIGN system value to prevent a hacker from having unlimited
attempts to guess a password and therefore mount password attacks. Here are
some options that you should consider using:</p>
<ul><li>Use an FTP server logon exit program to reject logon requests by any system
user profiles and those user profiles that you designate not be allowed FTP
access. (When using such an exit program, logon attempts rejected by the
server logon exit point for the user profiles that you block do <strong>not</strong> get
counted against the profile's QMAXSIGN count.)</li>
<li>Use an FTP server logon exit program to limit the client machines from
which a given user profile is allowed to access the FTP server. For example,
if a person from Accounting is allowed FTP access, only allow that user profile
FTP server access from computers which have IP addresses in the Accounting
department.</li>
<li>Use an FTP server logon exit program to log the user name and IP address
of all FTP logon attempts. Review these logs regularly, and whenever a profile
is disabled by maximum password attempts, use the IP address information to
identify the perpetrator and take appropriate measures.</li>
<li><img src="./delta.gif" alt="Start of change" />Use the intrusion detection system to detect "denial of service"
attacks on the system.<img src="./deltaend.gif" alt="End of change" /></li>
</ul>
</li>
</ul>
<p>Additionally, you can use FTP server exit points to provide an anonymous
FTP function for guest users. Setting up a secure, anonymous FTP server requires
exit programs for both the FTP server logon <strong>and</strong> FTP server request
validation exit points.</p>
<p><img src="./delta.gif" alt="Start of change" />You can use the Secure Sockets Layer (SSL) to provide secure
communications sessions for your FTP server. Using SSL ensures that all FTP
transmissions are encrypted to maintain confidentiality for all data that
passes between the FTP server and the client, including user names and passwords.
The FTP server supports the use of digital certificates for client authentication
also.<img src="./deltaend.gif" alt="End of change" /></p>
<div class="p">To learn more about using FTP, its risks, and
the security measures available to you, review these resources: <ul><li><a href="../rzaiq/rzaiqrzaiqimplement.htm">Secure
FTP</a>.</li>
<li><a href=" ../rzaiq/rzaiqsslparent.htm">Use
SSL to secure the FTP server</a>.</li>
</ul>
</div>
<p><img src="./delta.gif" alt="Start of change" />In addition to these FTP options, you may want
to consider using Anonymous FTP to provide a convenient way for users to access
non-confidential material easily. Anonymous FTP enables unprotected access
(no password required) to selected information about a remote system. The
remote site determines what information is made available for general access.
Such information is considered to be publicly accessible and can be read by
anyone. Before configure Anonymous FTP, you should weigh the security risks
and consider securing your FTP server with exit programs.<img src="./deltaend.gif" alt="End of change" /></p>
<ul><li><a href="../rzaiq/rzaiqftpanon.htm">Configure
Anonymous FTP</a>.</li>
<li><a href="../rzaiq/rzaiqftpscon.htm">Manage
access using FTP exit programs</a>.</li>
</ul>
</div>
<div>
<div class="familylinks">
<div class="parentlink"><strong>Parent topic:</strong> <a href="rzaj45zrscenario1risks.htm" title="Use this information to learn about common Internet security risks for a number of popular Internet applications and services and measures that you can take to manage these risks.">Application security options</a></div>
</div>
<div class="relconcepts"><strong>Related concepts</strong><br />
<div><a href="rzaj45zoemail.htm" title="Using e-mail across the Internet or other untrusted network imposes security risks against which using a firewall may not protect.">E-mail security</a></div>
<div><a href="../rzaja/rzajagetstart.htm">Virtual private network (VPN)</a></div>
<div><a href="rzaj40a0internetsecurity.htm" title="Your security policy defines what you want to protect and what you expect of your system users.">The layered defense approach to security</a></div>
<div><a href="../rzaub/rzaubkickoff.htm">Intrusion detection</a></div>
</div>
<div class="relref"><strong>Related reference</strong><br />
<div><a href="../rzalx/rzalxsecterms.htm">Security terminology</a></div>
</div>
</div>
</body>
</html>