Compare cert salaries and plan your next career move
dynamik wrote: » I was referring to a solution like Forsaken mentioned. Even if you just do something like a five-minute lockout after five attempts, you're going to slow down the cracking process and reduce bandwidth usage dramatically. Few people will focus on a server that gives them 60 login attempts an hour when they can do more in a minute on another server. I doubt anyone is trying to get into your server specifically; most are just looking for something convenient. I think changing the port number will help as well. That's a security-through-obscurity approach, but since you seem to be more concerned with the resources of your network and server than security, I think that would help. You're not going to stop someone determined, but you'll avoid a lot of the automated tools/script kiddies that just look for FTP on port 21. Honestly, I'd install the Filezilla server and ask that your partners/customers download the client and use that. Not only will that allow you to run FTP securely, you'll also be able to create another user database that's separate from AD. I think combining that with a non-standard port to remedy the aforementioned resource issues will be a win for you.
Paul Boz wrote: » FTP has numerous security risks. For one thing its clear-text so if someone wants to they can sniff the wire to grab credentials or intercept the data that is being transferred. I do man in the middle attacks like this all the time. Cain will even automatically filter out the credentials. Another risk is the fact that FTP uses dynamic ports for data transfer. This means that while you may open port 21 for FTP communications and signalling, you more than likely have to open a range of ports for data transfer. For this reason my company advises customers against allowing FTP on the external network. It's just not a good idea. A better solution would be to filter by IP address if possible. If that isn't an option another solution is to do as Dynamic advised, and place the FTP behind a VPN. Another solution would be to completely segregate the FTP server into its own DMZ protected by its own firewall. Again, if sensitive material is kept on the FTP you should remove it from the external network. There are much more secure methods of file transfer. FTP is outdated and insecure.
veritas_libertas wrote: » Out of curiosity Paul, I would think that FTP over SSH would still be fine though. Am I wrong? : I was just reading an article on FTP from SANS and it made me remember this thread...
Compare salaries for top cybersecurity certifications. Free download for TechExams community.