<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Secure FTP on VMS in Operating System - OpenVMS</title>
    <link>https://community.hpe.com/t5/operating-system-openvms/secure-ftp-on-vms/m-p/5323199#M45441</link>
    <description>&lt;P&gt;While sharing three letters in its name and its purpose, sftp is entirely different from ftp. &amp;nbsp;And to add confusion, ftps is ftp via ssl; yet different.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Traditional sftp cannot typically be proxied without breaching the protocol security; a proxy server is seeking to perform a Man-in-the-Middle protocol attack, and sftp and ssh are intended to avoid exposures to that and to flag that.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Traditional ftp can be proxied, and (barring an ftp connection via a site-to-site or client-to-site VPN, stunnel, or related) is exquisitely insecure, in addition to its usual issues with navigating firewalls.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;OpenVMS with TCP/IP Services offers both ftp client and server, and variants of SSH's sftp client and server.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Talk with your corporate network IT and network security here around firewall options and protocols. &amp;nbsp;Some sites limit sftp and ssh (because they can't sniff it) and some prefer the secure protocols to telnet and ftp (which can be sniffed, and which do trivially expose the login credentials in cleartext).&lt;/P&gt;</description>
    <pubDate>Tue, 06 Sep 2011 12:43:11 GMT</pubDate>
    <dc:creator>Hoff</dc:creator>
    <dc:date>2011-09-06T12:43:11Z</dc:date>
    <item>
      <title>Secure FTP on VMS</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/secure-ftp-on-vms/m-p/5323117#M45440</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We run an Alpha Server DS20E - &amp;nbsp;VMS 8.3, SSH 5.5, TCPIP 5.6-ECO 5&lt;/P&gt;&lt;P&gt;We can Secure FTP with the command "$ SFTP2" to other servers on our corporate network (WAN)&lt;/P&gt;&lt;P&gt;We can FTP through our proxy to&amp;nbsp;EXTERNAL FTP sites.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We wish to Secure FTP through our proxy to&amp;nbsp;EXTERNAL Secure FTP sites.&lt;/P&gt;&lt;P&gt;How can this be achieved?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I can acheive a similar result from a Windows XP PC on the same network. I use PUTTY which allows the&amp;nbsp;setup of a proxy and secure FTP is acheived to EXTERNAL clients. Trying to setup something similar &amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;for our VMS system.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 06 Sep 2011 11:16:37 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/secure-ftp-on-vms/m-p/5323117#M45440</guid>
      <dc:creator>robert70</dc:creator>
      <dc:date>2011-09-06T11:16:37Z</dc:date>
    </item>
    <item>
      <title>Re: Secure FTP on VMS</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/secure-ftp-on-vms/m-p/5323199#M45441</link>
      <description>&lt;P&gt;While sharing three letters in its name and its purpose, sftp is entirely different from ftp. &amp;nbsp;And to add confusion, ftps is ftp via ssl; yet different.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Traditional sftp cannot typically be proxied without breaching the protocol security; a proxy server is seeking to perform a Man-in-the-Middle protocol attack, and sftp and ssh are intended to avoid exposures to that and to flag that.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Traditional ftp can be proxied, and (barring an ftp connection via a site-to-site or client-to-site VPN, stunnel, or related) is exquisitely insecure, in addition to its usual issues with navigating firewalls.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;OpenVMS with TCP/IP Services offers both ftp client and server, and variants of SSH's sftp client and server.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Talk with your corporate network IT and network security here around firewall options and protocols. &amp;nbsp;Some sites limit sftp and ssh (because they can't sniff it) and some prefer the secure protocols to telnet and ftp (which can be sniffed, and which do trivially expose the login credentials in cleartext).&lt;/P&gt;</description>
      <pubDate>Tue, 06 Sep 2011 12:43:11 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/secure-ftp-on-vms/m-p/5323199#M45441</guid>
      <dc:creator>Hoff</dc:creator>
      <dc:date>2011-09-06T12:43:11Z</dc:date>
    </item>
    <item>
      <title>Re: Secure FTP on VMS</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/secure-ftp-on-vms/m-p/5329217#M45442</link>
      <description>&lt;P&gt;SFTP' ing through a proxy is not possible using the standard SFTP tool&lt;BR /&gt;as supplied with TCP/IP services.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Curl would be an alternative, but the currently standard curl build for VMS&lt;BR /&gt;does not offer SSH.&lt;BR /&gt;&lt;BR /&gt;You might have luck with a creative STunnel solution, but that would&amp;nbsp;&lt;BR /&gt;be a lot of work to set up and maintain, and could open up a lot of&lt;BR /&gt;unintended security holes.&lt;BR /&gt;&lt;BR /&gt;I humbly beg to disagree with Hoff that SSH over an HTTP connect proxy&lt;BR /&gt;(the usual proxy type) would break the protocol any more than another&lt;BR /&gt;network component like a router or a switch would.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 12 Sep 2011 17:11:13 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/secure-ftp-on-vms/m-p/5329217#M45442</guid>
      <dc:creator>Jose_Baars</dc:creator>
      <dc:date>2011-09-12T17:11:13Z</dc:date>
    </item>
    <item>
      <title>Re: Secure FTP on VMS</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/secure-ftp-on-vms/m-p/5329263#M45443</link>
      <description>&lt;P&gt;This so-called forum software is utter dreck.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Some folks mean proxying over a protocol. &amp;nbsp;Some mean to establish a connection via an intermediate proxy host.﻿&lt;/P&gt;&lt;P&gt;﻿&lt;/P&gt;&lt;P&gt;﻿If you can intercept ssh (which is what a proxy host does), then there's a problem with your certificate vendor, or with your local certificate security or ceriticate authority, or you've deliberately decided to expose your secured traffic to traverse the proxy host.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If somebody is blocking ssh for whatever reason, then yes, you can proxy over DNS or http or otherwise (and which is an end-to-end connection and should be secure), via a tool such as corkscrew via an ssh ProxyCommand via netcat or such and bypass the filters, or you can potentially use multi-hop ssh. &amp;nbsp; (And some of these mean you really need to trust that proxy host.)&lt;/P&gt;</description>
      <pubDate>Mon, 12 Sep 2011 17:59:19 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/secure-ftp-on-vms/m-p/5329263#M45443</guid>
      <dc:creator>Hoff</dc:creator>
      <dc:date>2011-09-12T17:59:19Z</dc:date>
    </item>
    <item>
      <title>Re: Secure FTP on VMS</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/secure-ftp-on-vms/m-p/5330369#M45444</link>
      <description>&lt;P&gt;Thank you both for your replies&lt;/P&gt;&lt;P&gt;Not exactly the answers I was looking for so&lt;/P&gt;&lt;P&gt;I propose to keep these procedures on a networked PC for the time being as I have a process working using PUTTY PSFTP.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Sep 2011 14:03:41 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/secure-ftp-on-vms/m-p/5330369#M45444</guid>
      <dc:creator>robert70</dc:creator>
      <dc:date>2011-09-13T14:03:41Z</dc:date>
    </item>
    <item>
      <title>Re: Secure FTP on VMS</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/secure-ftp-on-vms/m-p/5330449#M45445</link>
      <description>&lt;P&gt;Escalate this to management. &amp;nbsp;A security policy or firewall rule that might well be a reasonable design in the generic but that's now in the way of fulfilling a specific business requirement can usually be removed or adjusted through the assistance of management. &amp;nbsp;These sorts of trade-offs are what management gets paid for, after all.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Sep 2011 15:07:44 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/secure-ftp-on-vms/m-p/5330449#M45445</guid>
      <dc:creator>Hoff</dc:creator>
      <dc:date>2011-09-13T15:07:44Z</dc:date>
    </item>
    <item>
      <title>Re: Secure FTP on VMS</title>
      <link>https://community.hpe.com/t5/operating-system-openvms/secure-ftp-on-vms/m-p/5332363#M45446</link>
      <description>I'm sure IPSec (that has been on the roadmap for ober 10 yrs) must be available on VMS real soon now.&lt;BR /&gt;&lt;BR /&gt;Could provide the security you require?&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 15 Sep 2011 03:08:20 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-openvms/secure-ftp-on-vms/m-p/5332363#M45446</guid>
      <dc:creator>Richard J Maher</dc:creator>
      <dc:date>2011-09-15T03:08:20Z</dc:date>
    </item>
  </channel>
</rss>

