From: trentbuck@gmail.com (Trent W. Buck)
To: netfilter@vger.kernel.org
Subject: Re: One more application available for nftables
Date: Thu, 21 Nov 2019 14:04:48 +1100 [thread overview]
Message-ID: <87zhgq9bfz.fsf@goll.lan> (raw)
In-Reply-To: 372da802-bc2e-a055-6ece-3c765c38ee00@trustiosity.com
zrm <zrm@trustiosity.com> writes:
> On 11/17/19 21:43, Trent W. Buck wrote:
>
>> I see you're matching vsftpd. I very very strongly recommend
>> you... encourage your end users to switch from FTP to SFTP. :-)
>> (Many (most?) Windows FTP clients can do SFTP these days.)
>>
>
> It's always fun to see the systems people and the network people argue
> over this.
>
> Everybody should obviously discontinue using plaintext FTP, but FTPS
> (i.e. FTP over TLS) is a thing that exists, and is generally a much
> smaller configuration change for an existing FTP service than
> switching to SFTP (i.e. the SFTP subsystem of the SSH protocol).
>
> Using SFTP also admits a lot of protocol features that you Do Not Want
> if all you're after is file transfers. Configure it a bit wrong and
> your users get a shell, the ability to forward ports from the public
> address of your SFTP server to their client, the ability to forward
> ports from their client to whatever internal hosts they want on the
> same internal network as your SFTP server, a VPN, X11 forwarding etc.
>
> By contrast, the disadvantage of FTPS is that it uses separate control
> and data connections, and because it's encrypted, the firewall can't
> snoop the control connection to see which ports it will use for the
> data connection. So the only way to really make it work is to allow
> clients to make outgoing connections to arbitrary unprivileged
> ports. Then you have to convince the client's network administrator to
> allow that.
>
> But the alternative is to allow outgoing connections to the SSH
> port. Which, because it's opaque and supports port forwarding and VPN
> and so on, effectively allows the same thing anyway.
This is an excellent analysis, thank you.
Obviously I have personal Opinionsâ„¢ about FTPS vs SFTP, but
I think we can agree that plaintext FTP is worse than EITHER. :-)
Some tangential comments:
* (for me) ssh is already there for system administration, and
"grant more access to existing service" can be an easier sell than
"deploy another service".
* tinyssh and dropbear use OpenSSH's sftp driver,
so there's a monoculture risk there. (Not sure about GNU ssh.)
* OpenSSH with "internal-sftp" can chroot without needing anything
inside the chroot (but chroot(2) isn't a security feature).
* OpenSSH authorized_keys now has "restrict" keyword (block all
features). This means you no longer need to go back and update the
blocked feature list every time you upgrade SSH. No equivalent in
sshd_config (yet) AFAICT.
* SFTP is _still_ only a draft RFC, whereas
FTPS is a full standards-track RFC.
* As a wild alternative, you could do plain rsync --daemon, and
auth/encrypt at l2/l3 with a wireguard/openvpn/ipsec peer link :-)
prev parent reply other threads:[~2019-11-21 3:04 UTC|newest]
Thread overview: 8+ messages / expand[flat|nested] mbox.gz Atom feed top
2019-10-04 14:55 Cannot add ip6 elements to a named set Matt
2019-10-04 14:58 ` Florian Westphal
2019-10-04 15:14 ` minor change recommendation for https://wiki.nftables.org Matt
2019-11-14 19:40 ` One more application available for nftables Matt
2019-11-18 2:43 ` Trent W. Buck
2019-11-19 8:36 ` Alessandro Vesely
2019-11-20 16:41 ` zrm
2019-11-21 3:04 ` Trent W. Buck [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=87zhgq9bfz.fsf@goll.lan \
--to=trentbuck@gmail.com \
--cc=netfilter@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.