Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
12-13-2001 01:36 PM
12-13-2001 01:36 PM
FTP
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
12-13-2001 02:31 PM
12-13-2001 02:31 PM
Re: FTP
How to Know if your Anonymous FTP Server is secure
This section is intended for the administrator to go down a small check
list of things to make sure his server is not easily compromised.
a) Check to make sure your ftp server does not have SITE EXEC command by
telneting to port 21 and typing SITE EXEC. If your ftp daemon has SITE EXEC
make sure it is the most current version (ie, Wu-FTP 2.4). In older versions
this allows anyone to gain shell via port 21.
b) Check to make sure no one can log in and make files or directories in the
main directory. If anyone can log in as anonymous FTP and make files such as
.rhosts and .forward, instant access is granted to any intruder.
c) Check to make sure the main directory is NOT owned by ftp. If it is
owned by FTP, an intruder could SITE CHMOD 777 the main directory and then
plant files to give him instant access. SITE CHMOD command should be removed
because anonymous users do not need any extra priviledges.
d) Check to make sure NO files or directories are owned by ftp. If they are,
it is possible an intruder could replace them with his own trojan versions.
e) There were several bugs in old daemons, so it is very important to make
sure you are running the most current ftp daemons.
GL,
C
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
12-13-2001 02:37 PM
12-13-2001 02:37 PM
Re: FTP
The easiest way is to set up an account that
does 'ftp' only for that user.
An example of how this user look in /etc/passwd
as below
ftpuser:hhsInUGG0TZ0c,A/rN:105:20:FTP:/home/FTP:/usr/bin/false
Add an entry to /etc/shells file
/usr/bin/false
HTH
-Michael
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
12-19-2001 11:54 AM
12-19-2001 11:54 AM
Re: FTP
A5651654
NR0801KBRC00007714
Simple, straight forward.
Even a dummy like me could follow this.
dl
(search by document)
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
12-19-2001 11:58 AM
12-19-2001 11:58 AM
Re: FTP
Try this link to create a restricted ftp user,
http://us-support2.external.hp.com/cki/bin/doc.pl/sid=125935fb0fb42fb91e/screen=ckiDisplayDocument?docId=200000057370859
Ans this to log all user activities when using ftp,
http://us-support2.external.hp.com/cki/bin/doc.pl/sid=125935fb0fb42fb91e/screen=ckiDisplayDocument?docId=200000015093169
Hope this helps.
Regds