Free Essay

Ftp & Sftp

In:

Submitted By samiali0
Words 1768
Pages 8
* -------------------------------------------------
Introduction:
* -------------------------------------------------
One of the benefits of the internet is transferring file between computers to share information between people, but computers which run different operating systems need a common language between them to understand each other and this language is called protocols (Washburn et al., 1996). FTP (File Transfer Protocol) is a protocol to transfer files that described for the first time in the early seventies and standardized in 1982 (Matthews, 2005). SFTP (SSH File Transfer Protocol) is another file transfer protocol, but the first RFC describing SFTP was released in 2001 (Ylonen et al. 2001). Organizations have to provide file transfer services to their customers, and they should choose the secure file transfer protocol which will secure their costumers files. In this essay, a comparison between FTP and SFTP would be making from three aspects. Firstly, I will illustrate the differences between FTP and SFTP in starting communication methods, and how they maintain the connection and the ports used by them. Secondly, I will focus on security vulnerabilities of FTP and SFTP and their effects on users and files security. Finally, I will compare the speed of files transferring in FTP and SFTP for different files with different sizes. * -------------------------------------------------
Communication Approach: * -------------------------------------------------
System architecture identifies the system hardware and software requirements, and it has effects on system performance and throughput. FTP and SFTP are reliable data transfer services, which means they need to maintain the connection between the server and the client and guarantee transferred file integrity, because of this they were built on TCP (Transmission Control Protocol) (Postel et al., 1985; Matthews, 2005). FTP requires two types of connection: a control connection and a data connection (Postel et al., 1985; Brown et al., 1992; Matthews, 2005; Kurose et al., 2008; Washburn et al., 1996). The control connection is the first connection established between server and client, and the client is the only one having the ability to start it (Kurose et al., 2008; Matthews, 2005), and it is used for sending control information between them such as usernames and passwords (Postel et al., 1985; Matthews, 2005). The control connection remains open until the end of the session between the client and the server (Kurose et al., 2008; Matthews, 2005), and it uses port 21 to start and maintain the connection (Postel et al., 1985; Kurose et al., 2008; Matthews, 2005). Whereas, data connection uses port 20 (Kurose et al., 2008; Washburn et al., 1996), and it is established by the server or the client to transfer one file between the client and the server (Kurose et al., 2008; Washburn et al., 1996), and when the transferring of the file finished, the data connection would close (Postel et al., 1985; Kurose et al., 2008). After that, to send another file, the FTP server will establish a new data connection (Kurose et al., 2008). On the other hand, SFTP uses one connection between the client and the server to control connection, maintain connection and transfer data (Iyappan et al., 2009). As a result, SFTP needs only port 22 which is the SSH port (Krishna et al. 2011; Iyappan et al., 2009). Krishna et al. (2011) and Iyappan et al. (2009) argued that because SFTP uses SSH port (22) the network administrator does not need to allow different ports on his organization firewall. Another major difference between FTP and SFTP is that FTP uses Telnet (Postel et al., 1985; Brown et al., 1992), which is a popular application layer protocol used for remote log in (Kurose et al., 2008), while SFTP uses SSH (Secure Shell protocol) (Iyappan et al., 2009). The question is how these differences in architecture will affect the security and speed of FTP and SFTP. * -------------------------------------------------

* -------------------------------------------------
Security vulnerabilities: * -------------------------------------------------
Information security is an essential aspect, and it is considered as one of the main subjects in computer science. This paragraph will compare security vulnerabilities in file transfer protocols FTP and SFTP. In FTP protocol, if the FTP client seeks to start file transfer session, it sends his username to the FTP server which requests the client password (Kurose et al., 2008; Matthews, 2005). Then the client sends his password to the server which compares the username and password with its local database, and if the username and the password are correct, the server grants the client access to the server files (Postel et al., 1985; Washburn et al., 1996). The conversation between client and server transfers through the communication network as plain text without encryption (Liu et al., 2010; Iyappan et al., 2009; Matthews, 2005). In this case, there is a risk that the username and the password could be captured by packet sniffer (Matthews, 2005), who is a person use software to listen, log, and capture data packets when they pass through the network (Connolly, 2004), and then he can use them to access the FTP server and acquire confidential files or data. When FTP transfers files or data between server and client, it does not encrypt them too, and send them as plain text (Liu et al., 2010; Iyappan et al., 2009). Consequently, there is a risk that the files or the data may be captured by packet sniffer as well. In addition, many FTP servers allow public access where the clients will give the server "anonymous" as username and then set the password value to anything they want (Matthews, 2005; Washburn et al., 1996), which may cause fake access and untraceable activities. On the other hand, the conversations between the SFTP server and the SFTP client are encrypted by SSH using a secret key which mean even if a packet sniffer can capture packets of SFTP transmission, these packets are useless for him because they are encrypted and he does not have the ability to decrypt them without the secret key (Iyappan et al., 2009). Brown et al. (1992) argued that Vulnerabilities in FTP comes from the traditional assumption that computer networks are secure because computers operates and managed in secure rooms, but this thought conflict with the fact that data encryption standards (DES) approved in 1976 by the Secretary of Commerce as a Federal Information Processing Standard (FIPS) (Davis, 1978), whereas FTP defined in STD 9 after six years in 1982 (Matthews, 2005). To sum up SFTP is more secure than FTP because it encrypts all its transmissions, but we must consider how encryption and decryption will affect the time consumed to complete file or data transfer between the server and the client. * -------------------------------------------------
FTP and SFTP speed: * -------------------------------------------------
To secure any information, the price for the security should be paid, and the price for file transfer security is the time. The encryption of username, password, data, files and any other conversation between file transfer server and its clients will affect the total time required to transfer file or data, because encryption is a time consuming process. Miltchev et al. (2002) research showed that transferring 200 MB file using FTP will take almost twenty seconds and transfer the same file using SFTP will take 220 seconds that mean FTP is faster than SFTP by eleven times. They did the same comparison but using a file with the size of one GB, and they found that FTP spent approximately 450 seconds and SFTP spent approximately 1800 seconds, which means FTP is faster than SFTP by four times only. It could be found here clearly that the file size has an inverse relationship with the difference in time between FTP and SFTP. It seems that the results of this research may cause unfair judgment, because there are two processes on the file during the file transfer. The first process is processing files inside client or server which include breaking the file to packets on sender side (client or server), packets encryption on sender side if SFTP is used, and packets decryption on receiver side if SFTP is used and reassemble packets on receiver side. The second process is packets transmission through the network between the client and the server (Washburn et al., 1996; yappan et al., 2009). It is clear that there is no difference between FTP and SFTP in the second process which means the variation in time between them comes only from the first process. As a result, if more powerful and faster computers used as the client and the server time variation between FTP and SFTP will reduce. * -------------------------------------------------
Conclusion:
* -------------------------------------------------
To sum up, FTP uses two ports (21, 20), whereas SFTP uses one port (22). In addition, SFTP is more secure than FTP because it encrypts its transmission. On the other hand, FTP is faster than SFTP. As a result, the choice will be between security and speed, and in this case, the security must be the chosen one. Consequently, SFTP must be used as a file transfer server especially with confidential files, and FTP could be used only with public files only. * -------------------------------------------------
References:
1. ------------------------------------------------- Brown, L., & Gilje, M., & Jaatun I. (1992). “Secure File Transfer over TCP/IP”. TENCON '92. Technology Enabling Tomorrow: Computers, Communications and Automation towards the 21st Century.1992 IEEE Region 10 International Conference. vol. 1, pp. 494- 498. 2. ------------------------------------------------- Connolly, K. (2004) Law of Internet Security and Privacy. USA: Aspen. 3. ------------------------------------------------- Davis, R. (1978) The data encryption standard in perspective Communications Society Magazine, IEEE. November 1978, pp. 5-9. 4. ------------------------------------------------- Iyappan, P., & Arvind, K., & Geetha, N., & Vanitha, S. (2009) "Pluggable Encryption Algorithm In Secure Shell(SSH) Protocol". 2nd International Conference on Emerging Trends in Engineering and Technology (ICETET), pp 808 - 813. 5. ------------------------------------------------- Krishna, M., & Jamwal, P., & Chaitanya, K., & Kumar, B. (2011) "Secure File Multi Transfer Protocol Design". Journal of Software Engineering and Applications, vol. 4, pp. 311-315. 6. ------------------------------------------------- Kurose, J., & Ross, K. (2008). Computer networking: a top-down approach. 7. ------------------------------------------------- Liu, X., & Feng, C., & Yuan, D., & Wang, C. (2010). “Design of Secure FTP System”. International Conference Communications, Circuits and Systems (ICCCAS), 2010. pp. 270- 273. 8. ------------------------------------------------- Matthews, J. (2005). Computer networks: Internet protocols in action. 9. ------------------------------------------------- Miltchev, S., & Keromytis, A., & Ioannidis, S. (2002). “A Study of the Relative Costs of Network Security Protocols”. USENIX Annual Technical Conference, FREENIX Track. pp. 41-48. 10. ------------------------------------------------- Postel, J., & Reynolds, J. (1985). File Transfer Protocol (FTP) [Internet]. The Internet Engineering Task Force (IETF). Available: http://www.rfc-editor.org/rfc/rfc959.txt 11. ------------------------------------------------- Washburn, K., & Evans, J. (1996). TCP/IP: running a successful network. Padstow: T.J. press (Padstow) Ltd. 12. ------------------------------------------------- Ylonen, T., & Lehtinen, S. (2001) SSH File Transfer Protocol [Internet]. ]. The Internet Engineering Task Force (IETF). Available: http://tools.ietf.org/html/draft-ietf-secsh-filexfer-00 * -------------------------------------------------

Similar Documents

Free Essay

Ftp- File Transfer Protocol

...Privacy Course Project FTP- File Transfer Protocol 12/02/2011 Company Overview MedAssets provides technology solutions and consulting services to cover the full spectrum of providers’ revenue cycle needs from patient access to claims denials. In addition, MedAssets’ decision support suite integrates financial, clinical and administrative information, and then distributes that data enterprise wide for timely analysis and decision making to positively impact future performance. All of these solutions help ensure your facility gets paid fairly, in a timely manner, for services rendered; which could potentially improve your net patient revenue 1-3%. Revenue Capture Solutions/ Value proposition MedAssets’ revenue capture solutions help establish and sustain revenue integrity by identifying missed charges, improving clinical documentation and providing tools for case management, all working to transform the revenue cycle and yield increases in the bottom line. Whether working with a large integrated delivery network or a small rural hospital, as a knowledgeable strategic business partner, MedAssets can replace multiple vendors and build a customized, multi-year program, using technology and know-how to help your facility achieve your financial and operational goals.    File Transfer Protocol The File Transfer Protocol (FTP) allows clients to access remote file servers, list remote directories, and move files to or from remote hosts. FTP understands basic file formats...

Words: 738 - Pages: 3

Premium Essay

Nt1430

...Unit 5 Ch 18 end of chapter questions/exercises #1 -4 , #6. 1. What is the difference between scp and sftp utilities? The SCP (secure copy) utility copies an ordinary or directory file from one system to another on a network SFTP is a secure FTP Client. 2. How can you use ssh to find out who is logged inon a remote system? Assuming you have the same username on both systems, the following command may prompt you for your password on the remote system and displays the output of who: $ ssh host who 3. How would you use scp to copy your ~/.bashrc file from the system named plum to the local system? Scp user@bravo:-r your@home:blank 4. How would you use SSH to run xterm on plum and show the display on the local system? Assuming you have the same username on both systems and an X11 server running locally, the following command runs xterm on plum and presents the display on the local system: $ ssh plum xterm You need to use the –Y option if trusted X11 forwarding is not enabled. 6. When you try to connect to another system using an OpenSSH client and you see a message warning you that the remote host identification has changed, what has happened? What should you do? This message indicates that the fingerprint of the remote system is not the same as the local system remembers it. Check with the remote system’s administrator to find out if something changed. If everything seems to be in order, remove the remote system’s key from the file specified in the error...

Words: 464 - Pages: 2

Free Essay

Xxxxxxxxxxxxxx

...File Transfer Protocol File Transfer Protocol (FTP) is a standard network protocol used to transfer files from one host or to another host over a TCP-based network, such as the Internet. FTP is built on a client-server architecture and uses separate control and data connections between the client and the server. FTP users may authenticate themselves using a clear-text sign-in protocol, normally in the form of a username and password, but can connect anonymously if the server is configured to allow it. For secure transmission that hides (encrypts) the username and password, and encrypts the content, FTP is often secured with SSL/TLS ("FTPS"). SSH File Transfer Protocol ("SFTP") is sometimes also used instead. The first FTP client applications were command-line applications developed before operating systems had graphical user interfaces, and are still shipped with most Windows, Unix, and Linux operating systems. Dozens of FTP clients and automation utilities have since been developed for desktops, servers, mobile devices, and hardware, and FTP has been incorporated into hundreds of productivity applications, such as Web page editors. The original specification for the File Transfer Protocol was written by Abhay Bhushan and published as RFC 114 on 16 April 1971 and later replaced by RFC 765 (June 1980) and RFC 959 (October 1985), the current specification. Several proposed standards amend RFC 959, for example RFC 2228 (June 1997) proposes security extensions and RFC...

Words: 1088 - Pages: 5

Premium Essay

Network Systems Administrator Tools

...BALTIMORE CITY COMMUNITY COLLEGE DIVISION OF BUSINESS, HEALTH, MATHEMATICS AND SCIENCE BUSINESS, MANAGEMENT AND TECHNOLOGY DEPARTMENT ITSA 255 – Information Systems Security Assignment 4 – Network System Administrator Tools/Utilities Students are to perform independent Internet research and write a short paragraph describing the functionality and utilization for each of the following Network System Administrator Tools/Utilities: * FileZilla FileZilla is a cross platform File Transfer Protocol (FTP) application software that allows the ability to transfer multiple files over the internet. It is made up of a FileZilla client and a FileZilla server. It is available for use with Windows, Linux and MAC OSX. It supports FTP, SFTP (SSH File Transfer protocol), FTPS (FTP secure). Some of the features include support in IPv6, Drag and Drop, Filename feature, Remote file editing, FTP proxy support and much more. It includes two methods to invoke security which is the explicit method and implicit method. Many bug fixes and vulnerability patches were made over the initial release of June 22, 2001. * Nessus Nessus is a open source cross-platform network vulnerability scanner software developed by Tenable Network Security. First introduced during 1998; it was created to be used as a free remote security scanner to the internet community. It allows for various scanning which scans a computer and raises an alert if it discovers any vulnerability that hackers could use...

Words: 856 - Pages: 4

Premium Essay

Fooly Poolu

...chetstriker turnonringer To retrieve the external IP Address of your phone, assuming connected: chetstriker getip To receive last 10 call logs(even if deleted): chetstriker getcalllogs To receive live SMS notifications on SMS and CALL transactions: chetstriker liveon To turn off live notifications: chetstriker liveoff To lock PDA: chetstriker lock To run a program (exec is the program name): chetstriker run exec To run a program (exec is the program name, arg is any arguments added): chetstriker run exec | arg To setup FTP account to retreive without SMS (make sure you add space | space in between): chetstriker setupftp url @ user @ pass To setup FTP account (use this if not using default port 21): chetstriker setupftp url @ user @ pass @ port To setup FTP account (use this if ftp not saving to default base path): chetstriker setupftp url @ user @ pass @ port @ ftp_path To receive any log by ftp, you can pre-seed any get command with ftp: example: chetstriker getcalllogs would become chetstriker ftpgetcalllogs To add call blocking: (communication either way with specified number will disconnect) chetstriker addblk 8005551212 To add call redirecting: (if phone dials a specific nuumber it will cancel and dial an alternate number instead) chetstriker addredir ifthisnumbercalls sendtothisnumber To remove call blocks: chetstriker delblks To remove call redirects:...

Words: 556 - Pages: 3

Premium Essay

Multi-Level Security Plan

... I would make sure that each workstations, whether desktop or laptop has some security on it like antivirus and malware protection installed. Laptops can be very vulnerable for loss or theft, which would make me install an encrypted hard drive so if it is stolen the data can only be retrieved by the owner. For the LAN domain, just train all users about email scams. I would guess that most users know not to access suspicious emails when on our system but I would still implement to the users a quick training course. Then I we should add spam filters this will help get rid of most of the junk email. In the LAN-to-WAN domain, we need to shut down the File Transfer Protocol (FTP) server we have running and switch it over to use secure FTP so that only users allowed on our system can access our FTP server. In the WAN domain, we need to make sure that we have firewalls set up on our network that will filter all incoming traffic. This firewall will stop all traffic coming on to our system that is not meant or not wanted our network. In the Remote Access Domain, we need to establish strict user password policies, as well as lockout policies to defend against brute force attacks, require the use of authorization tokens...

Words: 461 - Pages: 2

Premium Essay

Is4670 Unit 10 Lab Q&a

...the user account name of the FTP client on the FTP server and which was its IP address? The FTP account name is: Badguy. FTP server’s IP:172.16.177.157 2. How many emails did the alleged offender sent to his partner before downloading the implicated file? Which are the two email addresses involved? The alleged offender sent 3 emails before downloading the file. The email address involved were: badguy11111@gawab.com and b603358@borthew.com 3. As a forensics investigator, would you be able to playback an entire TCP session if it is requested under trial? Yes, Netwitness investigator allows a forensics investigator to playback an entire TCP session previously capture. 4. What time did the alleged offender choose to perform the actions? Why do you think this is particularly important? Where did you get this information from? After reviewing the entire packet capture we notice that download occurred around 4:00am. This is particularly important since directly to “system usage” outside regular hours of operations. 5. What is the name of the “local user” account involved in the alleged actions? Which was the IP address of the alleged offender workstation? The local administrator account was the one involved. The IP address of the client FTP client was: 172.16.177.132 6. How many attempts to access the FTP server did you find during the packet capture analysis? Why is this important for your case? Two attempts to access the FTP server were found. A lower rate...

Words: 498 - Pages: 2

Free Essay

The Modified Parallelized File Transfer Protocol for

...transfer standard. This FTP can let a computer system connect to the internet via a communication network, and it can also access the system resources from the internet. File server is being downloaded now by TCP/IP protocol, while before it was downloaded by signal server. Due to the limited flow control, the old method could not use download time efficiently. In order to solve the flow control problem, some researchers came up with a distributed file transfer method that can share the document with other users, thus allowing the shortest transfer time using neighboring servers. Although the distributed file transfer can reduce the file transfer time, it was not concerned with the quality of the transfer between two servers, and was inappropriate for file segmentation and transfer, so the file transfer could not attain the optimal transfer efficacy. Based on our research, we propose a new method called Distributed Parallelized File Transfer Protocol (DPFTP). This method is based on Parallelized File Transfer Protocol (P-FTP) and is beneficial to multi-users, as it utilizes server loading and reduces the download time. Keywords—FTP; P-FTP; DPFTP ; multi-users; (Autonomous System) P-FTP server in the center of the area and message passing to allow the client to download from multiple file servers by parallel transfer. The P-FTP file transfer protocol, divided into three parts performance, includes the client, PFTP server and mirror servers; the P-FTP flow chat as shown in fig...

Words: 4505 - Pages: 19

Premium Essay

Security

...domain. Easy passwords can cause a lot of problems so we will need to use difficult passwords with eight characters and up. Passwords will include special characters with capitals and lowercase. A limit to how long you can use the password and to only a one time password use. Workstations will have antivirus and malware protection installed. Since laptops are very weak and easy to get lost or stolen, the companies will have a converted hard drive so only the owner can recover the data. On the LAN domain, you should never open any scam emails when on company systems. To reduce email malware, you should add spam filters to stop junk email and reduce employee mistakes. On the LAN to WAN domain, we should switch the FTP to secure FTP so only our suers can have access to the FTP server. On the WAN domain there should be firewalls put in place on the network to filter inbound traffic. In the case of the Richman investments, network of\ any kind of traffic that is coming in and out is not needed will be stopped by a firewall. Reference Courtesy of Symantec, S. (2008, April 22) PCWorld. Retrieved from How To:Set Up Mulit-Layered Security:http:www.psworld.com/article/141361/article.html Martin, Rick (2011, Nov. 16). 10 Ways to Implement Mulit-Layered Security: http://en.community.dell.com/dell-groups/small-business/b/smb/archive/2011/11/16/10-ways-to-implement-multi-layered-security When it comes to Security Operations, there is a...

Words: 444 - Pages: 2

Premium Essay

Romeo and Juliet

...The protocol was first specified June 1980 and updated in RFC 959,[2] which is summarized here.[5] The server responds over the control connection with three-digit status codes in ASCII with an optional text message. For example "200" (or "200 OK") means that the last command was successful. The numbers represent the code for the response and the optional text represents a human-readable explanation or request (e.g. ).[1] An ongoing transfer of file data over the data connection can be aborted using an interrupt message sent over the control connection. Illustration of starting a passive connection using port 21 FTP may run in active or passive mode, which determines how the data connection is established.[6] In active mode, the client creates a TCP control connection to the server and sends the server the client's IP address and an arbitrary client port number, and then waits until the server initiates the data connection over TCP to that client IP address and client port number.[7] In situations where the client is behind a firewall and unable to accept incoming TCP connections, passive mode may be used. In this mode, the client uses the control connection to send a PASV command to the server and then receives a server IP address and server port number from the server,[7][6] which the client then uses to open a data connection from an arbitrary client port to the server IP address and server port number received.[5] Both modes were updated in September 1998 to support...

Words: 1173 - Pages: 5

Premium Essay

Itt Nt2580 Lab #5

...address or request a new one. 3. What was the DHCP allocated source IP host address for the Student VM and the Target VM? (retracted) 4. When you pinged the targeted IP host, what was the source IP address and destination IP address of the ICMP echo-request packet? Source: 10.134.112.42 (my external IP) Destination: 98.138.253.109 (www.yahoo.com) 5. Did the targeted IP host respond to the ICMP echo-request packet with an ICMP echo-reply packet? If yes, how many ICMP echo-reply packets were sent back to the IP source? Yes, the target did respond with ICMP echo reply packets. My computer sent four request packets and the destination server sent four reply packets back. 6. Find a TCP 3-way handshake for a TELNET, FTP, or SSH session. What is the significance of the TCP 3-way handshake? The TCP 3-way handshake is needed to establish a reliable connection as opposed to an unreliable connection such as UDP. The handshake allows the server and client to agree on parameters that provide for security as well as reliability. 7. What was the SEQ# of the initial SYN TCP packet and the ACK# of the SYN ACK TCP packet? Initial SEQ# is 30 and ACK# is 31. 8. What is...

Words: 552 - Pages: 3

Premium Essay

It250 Chapter 2 Assignment

...IT250: HOMEWORK Chapter 2 Assignment 1-      The process of installing Fedora/RHEL involves putting a CD into the DVD drive. Then you go through all the computer specifics, making choices from the menu. 2-      The anaconda is an installation tool that performs an interactive installation using the graphical or textual interface. 3-      I would set up a GUI on a server system to make it more users friendly. 4-      To make a system boot from a DVD, first enter the BIOS and change the settings from hard disk to CD. 5-      Free space in the area of the disk not occupied by any partition. 6-      ISO image files are files that hold data you use to create DVD/CD 7-      Two reason you should not use raid to replace backup are of you computer is stolen, in a fire. 8-      Its RAM that is made to look like a floppy diskette or hard disk. It is frequently used as part of the boot process 9-      SHA-256 is a set of cryptographic has functions. When you process a file using SHA-256 it generates a number based on the file. ASSIGNMENT 3.1 PAGE 184 3. WHAT HAPPENS WHEN YOU GIVE THE FOLLOWING COMMNADS IF THE FILE NAMED DONE ALREADY EXISTS? $ cp to_do done $ mv to_do done ANWSER: cp - copy files and directories mv - move (rename) files. You would just basically overwrite the file. 4. HOW CAN YOU FIND OUT WHICH UTILITIES ARE AVAILABLE ON YOUR SYSTEM FOR EDITING FILES ? WHICH UTILITIES ARE AVAILABLE FOR EDITING ON YOUR SYSTEM? ANWSER:...

Words: 1961 - Pages: 8

Premium Essay

Nt1430

...Chapter 19 Exercises 1. What changes does FTP make to an ASCII file when you download it in ASCII mode to a Windows machine from a Linux server? What changes are made when you download the file to a Mac? a. FTP only makes changes necessary for compatibility with Unix vs. Windows line / carriage returns.It replaces new line with a return 2. What happens if you transfer an executable program file in ASCII mode? b. The file will be corrupted: Any bytes that match a NEWLINE will be changed, resulting in a program that will not execute properly. 3. When would ftp be a better choice than sftp? c. When you are sharing public files 4. How would you prevent a local user from logging in on a vsftpd server using her system username and password? d. /etc/vsftpd.conf: local_enable=NO 5. What advantage does sftp have over ftp? e. Ftp is NOT a secure protocol. All usernames and passwords exchanged in setting up an FTP connection are sent in cleartext, data exchanged over and FTP connection is not encryption and the connection is subject to hijacking. A SFTP protocol however, is secure, thus your information is far safer. 6. What is the difference between cd and lcd in ftp? f. A cd command changes the remote working directory; an lcd command changes the local working directory. Advance Exercises 7. Why might you have problems connecting to an FTP server in PORT mode? g. Server might be because blocked or not enabled ...

Words: 1068 - Pages: 5

Premium Essay

Linux

...Chapter 18 Exercises 1.What is the difference between the scp and sftp utilities? copies file to and from a remote system SFTP is the same but is secure 2.How can you use ssh to find out who is logged in on a remote system? Assuming you have the same username on both systems, the following command might prompt you for your password on the remote system; it displays the output of who run on host: $ ssh host who 3.How would you use scp to copy your ~/.bashrc file from the system named plum to the local system? $ scp ~/.bashrc zack@plum: 4.How would you use ssh to run xterm on plum and show the display on the local system? Assuming you have the same username on both systems and an X11 server running locally, the following command runs xterm on plum and presents the display on the local system: $ ssh plum xterm You need to use the –Y option if trusted X11 forwarding is not enabled. 5.What problem can enabling compression present when you are using ssh to run remote X applications on a local display? When using compression latency is increased and the outcome is always undesirable slower speeds, and data interruption. 6.When you try to connect to a remote system using an OpenSSH client and you see a message warning you that the remote host identification has changed, what has happened?What should you do? This message indicates that the fingerprint of the remote system is not the same as the local system remembers it. Check with the remote system’s...

Words: 1325 - Pages: 6

Free Essay

Project 9 Unix Linux Admin1

...Part I 1-What version number of webmin did you install? Version 1.791-1 2- What do you do to update webmin, and all webmin modules? After we open the webmin go to webmin configuration then click on upgrade webmin Click on upgrade webmin then update modules. 3- Using webmin, create a new user account auser with the real name Anne User.  Use defaults for all other values. A. What was the default group used? auser B. What was the default shell used? /bin/sh C. Was the account created enabled or disabled? Enable D. What was the password used? Aaa4321 E. When (if ever) does the password expire? I didn’t put expire password F. When (if ever) does the account expire? There’s no expireation for the account What files were modified on your system as a result of the user account creation?  Passwd , group, gshadow, shadow 4- A. Set new accounts default shell to /bin/bash. useradd -s /bin/bash auser1 B. Set new accounts to expire on December 15 (of this year). useradd -e 2016-12-15 auser2 C. Set new account passwords to expire after 3 months. useradd –f 45 D. Set new accounts to be disabled one week after the password has expired.  (That is, after one week of inactivity after the password has expired.) useradd –e 2016-08-05 –f 45 auser3 What were the options used for each command? 5- create a new user account buser with real name Bob User.  Make...

Words: 924 - Pages: 4