All of lore.kernel.org
 help / color / mirror / Atom feed
From: trentbuck@gmail.com (Trent W. Buck)
To: netfilter@vger.kernel.org
Subject: Re: One more application available for nftables
Date: Thu, 21 Nov 2019 14:04:48 +1100	[thread overview]
Message-ID: <87zhgq9bfz.fsf@goll.lan> (raw)
In-Reply-To: 372da802-bc2e-a055-6ece-3c765c38ee00@trustiosity.com

zrm <zrm@trustiosity.com> writes:

> On 11/17/19 21:43, Trent W. Buck wrote:
>
>> I see you're matching vsftpd.  I very very strongly recommend
>> you... encourage your end users to switch from FTP to SFTP.  :-)
>> (Many (most?) Windows FTP clients can do SFTP these days.)
>>
>
> It's always fun to see the systems people and the network people argue
> over this.
>
> Everybody should obviously discontinue using plaintext FTP, but FTPS
> (i.e. FTP over TLS) is a thing that exists, and is generally a much
> smaller configuration change for an existing FTP service than
> switching to SFTP (i.e. the SFTP subsystem of the SSH protocol).
>
> Using SFTP also admits a lot of protocol features that you Do Not Want
> if all you're after is file transfers. Configure it a bit wrong and
> your users get a shell, the ability to forward ports from the public
> address of your SFTP server to their client, the ability to forward
> ports from their client to whatever internal hosts they want on the
> same internal network as your SFTP server, a VPN, X11 forwarding etc.
>
> By contrast, the disadvantage of FTPS is that it uses separate control
> and data connections, and because it's encrypted, the firewall can't
> snoop the control connection to see which ports it will use for the
> data connection. So the only way to really make it work is to allow
> clients to make outgoing connections to arbitrary unprivileged
> ports. Then you have to convince the client's network administrator to
> allow that.
>
> But the alternative is to allow outgoing connections to the SSH
> port. Which, because it's opaque and supports port forwarding and VPN
> and so on, effectively allows the same thing anyway.

This is an excellent analysis, thank you.

Obviously I have personal Opinionsâ„¢ about FTPS vs SFTP, but
I think we can agree that plaintext FTP is worse than EITHER. :-)

Some tangential comments:

  * (for me) ssh is already there for system administration, and
    "grant more access to existing service" can be an easier sell than
    "deploy another service".

  * tinyssh and dropbear use OpenSSH's sftp driver,
    so there's a monoculture risk there.  (Not sure about GNU ssh.)

  * OpenSSH with "internal-sftp" can chroot without needing anything
    inside the chroot (but chroot(2) isn't a security feature).

  * OpenSSH authorized_keys now has "restrict" keyword (block all
    features).  This means you no longer need to go back and update the
    blocked feature list every time you upgrade SSH.  No equivalent in
    sshd_config (yet) AFAICT.

  * SFTP is _still_ only a draft RFC, whereas
    FTPS is a full standards-track RFC.

  * As a wild alternative, you could do plain rsync --daemon, and
    auth/encrypt at l2/l3 with a wireguard/openvpn/ipsec peer link :-)


      reply	other threads:[~2019-11-21  3:04 UTC|newest]

Thread overview: 8+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2019-10-04 14:55 Cannot add ip6 elements to a named set Matt
2019-10-04 14:58 ` Florian Westphal
2019-10-04 15:14   ` minor change recommendation for https://wiki.nftables.org Matt
2019-11-14 19:40 ` One more application available for nftables Matt
2019-11-18  2:43   ` Trent W. Buck
2019-11-19  8:36     ` Alessandro Vesely
2019-11-20 16:41     ` zrm
2019-11-21  3:04       ` Trent W. Buck [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=87zhgq9bfz.fsf@goll.lan \
    --to=trentbuck@gmail.com \
    --cc=netfilter@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.