[ 
https://issues.apache.org/jira/browse/FTPSERVER-97?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel#action_12504353
 ] 

Steve Jones commented on FTPSERVER-97:
--------------------------------------

I don't think these ciphers should be enabled by default, the expectation when 
using "PROT P" is that the communication of data is "private", which (in the 
RFC) is later defined to mean integrity and confidentiality protected.

This doesn't really restrict implict FTPS but I think if people use SSL they 
expect data protection.

Here's a section from RFC 2228 related to the "PROT P" command that would be 
used to specify SSL for a data connection.

RFC 2228 - FTP Security Extensions - DATA CHANNEL PROTECTION LEVEL (PROT)

      This command indicates to the server what type of data channel
      protection the client and server will be using.  The following
      codes are assigned:

         C - Clear
         S - Safe
         E - Confidential
         P - Private

      The default protection level if no other level is specified is
      Clear.  The Clear protection level indicates that the data channel
      will carry the raw data of the file transfer, with no security
      applied.  The Safe protection level indicates that the data will
      be integrity protected.  The Confidential protection level
      indicates that the data will be confidentiality protected.  The
      Private protection level indicates that the data will be integrity
      and confidentiality protected.

That said, I certainly agree that it would be a good enhancement to allow 
configuration of SSL ciphers. I think by default nothing should be configured 
by the FTP server, this allows the SSL provider to be configured in some other 
way (e.g. programmatically in an embedded environment, or using provider 
specific configuration file)

It could also be useful allow SSL to be required, and for implict SSL to 
default protection to on, though currently it is possible to do this using the 
Ftplet API.

> SSL data connection enables all supported ciphers
> -------------------------------------------------
>
>                 Key: FTPSERVER-97
>                 URL: https://issues.apache.org/jira/browse/FTPSERVER-97
>             Project: FtpServer
>          Issue Type: Bug
>          Components: Core
>    Affects Versions: 1.0-M1
>            Reporter: Steve Jones
>
> The SSL implementation that is used by default for FTP data transfers 
> (DefaultSsl) enables all SSL cipher suites:
>   String cipherSuites[] = serverSocket.getSupportedCipherSuites();
>   serverSocket.setEnabledCipherSuites(cipherSuites);
> This is likely to enable ciphers such as:
>   SSL_RSA_WITH_NULL_MD5
>   SSL_RSA_WITH_NULL_SHA
> Which means that there is no confidentiality for the transport (in other 
> words authentication will occur but after that communication is in the 
> clear). 
> Usually you would not want to allow this, so it is best not to enable all 
> ciphers.
> Here's a reference to this issue for another apache project:
>   http://mail-archives.apache.org/mod_mbox/avalon-apps-dev/200209.mbox/[EMAIL 
> PROTECTED]

-- 
This message is automatically generated by JIRA.
-
You can reply to this email to add a comment to the issue online.

Reply via email to