[33250] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: FTP with authentication to RADIUS

daemon@ATHENA.MIT.EDU (Brian W.)
Fri Jan 5 11:11:25 2001

Date: Fri, 5 Jan 2001 08:09:14 -0800 (PST)
From: "Brian W." <bri@sonicboom.org>
To: Andrew Brown <atatat@atatdot.net>
Cc: Roeland Meyer <rmeyer@mhsc.com>,
	"'Steven J. Sobol'" <sjsobol@NorthShoreTechnologies.net>,
	joshua stein <jcs@rt.fm>, nanog@nanog.org
In-Reply-To: <20010105102759.A23453@noc.untraceable.net>
Message-ID: <Pine.BSF.4.21.0101050808370.33747-100000@cx175057-a.ocnsd1.sdca.home.com>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Errors-To: owner-nanog-outgoing@merit.edu


scp is also a possibility, its usage is a bit cryptic, but it is an
option..

			Brian

On Fri, 5 Jan 2001, Andrew Brown wrote:

> 
> >1) many versions of FTP make you system vulnerable to root cracks.
> 
> ...which are problems that need to be fixed.  if you know of any...
> 
> >2) There is NO way to run FTP in a SSH tunnel because it uses dynamic port
> >assignments.
> 
> well...that's not entirely true.  you can tunnel the command channel,
> just not the data channel.
> 
> >3) FTP logins are plain-text.
> 
> sure, which is why you tunnel them via ssh, or use ipsec.
> actually...if you use ipsec, you can get the data protected as well.
> 
> >For sharing files, with anonymous users, HTTP is much better (see:
> >http://files.dnso.net)
> 
> for sharing files with anonymous users, i'll always be using anonftp.
> 
> -- 
> |-----< "CODE WARRIOR" >-----|
> codewarrior@daemon.org             * "ah!  i see you have the internet
> twofsonet@graffiti.com (Andrew Brown)                that goes *ping*!"
> andrew@crossbar.com       * "information is power -- share the wealth."
> 



home help back first fref pref prev next nref lref last post