FTP Overview: FTP Control Channel, TCP Port 21: All Commands You Send and The FTP Server's Responses To
FTP Overview: FTP Control Channel, TCP Port 21: All Commands You Send and The FTP Server's Responses To
FTP relies on a pair of TCP ports to get the job done. It operates in two connection channels as
I'll explain:
FTP Control Channel, TCP Port 21: All commands you send and the ftp server's responses to
those commands will go over the control connection, but any data sent back (such as "ls"
directory lists or actual file data in either direction) will go over the data connection.
FTP Data Channel, TCP Port 20: This port is used for all subsequent data transfers between
the client and server.
Types of FTP
From a networking perspective, the two main types of FTP are active and passive. In active FTP,
the FTP server initiates a data transfer connection back to the client. For passive FTP, the
connection is initiated from the FTP client. These are illustrated in Figure 15-1.
From a user management perspective there are also two types of FTP: regular FTP in which files
are transferred using the username and password of a regular user FTP server, and anonymous
FTP in which general access is provided to the FTP server using a well known universal login
method.
1
Active FTP
1. Your client connects to the FTP server by establishing an FTP control connection to port
21 of the server. Your commands such as 'ls' and 'get' are sent over this connection.
2. Whenever the client requests data over the control connection, the server initiates data
transfer connections back to the client. The source port of these data transfer connections
is always port 20 on the server, and the destination port is a high port (greater than 1024)
on the client.
3. Thus the ls listing that you asked for comes back over the port 20 to high port connection,
not the port 21 control connection.
FTP active mode therefore transfers data in a counter intuitive way to the TCP standard, as it
selects port 20 as it's source port (not a random high port that's greater than 1024) and connects
back to the client on a random high port that has been pre-negotiated on the port 21 control
connection.
Active FTP may fail in cases where the client is protected from the Internet via many to one
NAT (masquerading). This is because the firewall will not know which of the many servers
behind it should receive the return connection.
Passive FTP
1. Your client connects to the FTP server by establishing an FTP control connection to port
21 of the server. Your commands such as ls and get are sent over that connection.
2. Whenever the client requests data over the control connection, the client initiates the data
transfer connections to the server. The source port of these data transfer connections is
always a high port on the client with a destination port of a high port on the server.
Passive FTP should be viewed as the server never making an active attempt to connect to the
client for FTP data transfers. Because client always initiates the required connections, passive
FTP works better for clients protected by a firewall.
As Windows defaults to active FTP, and Linux defaults to passive, you'll probably have to
accommodate both forms when deciding upon a security policy for your FTP server.
Regular FTP
By default, the VSFTPD package allows regular Linux users to copy files to and from their home
directories with an FTP client using their Linux usernames and passwords as their login
credentials.
2
VSFTPD also has the option of allowing this type of access to only a group of Linux users,
enabling you to restrict the addition of new files to your system to authorized personnel.
The disadvantage of regular FTP is that it isn't suitable for general download distribution of
software as everyone either has to get a unique Linux user account or has to use a shared
username and password. Anonymous FTP allows you to avoid this difficulty.
Anonymous FTP
Anonymous FTP is the choice of Web sites that need to exchange files with numerous unknown
remote users. Common uses include downloading software updates and MP3s and uploading
diagnostic information for a technical support engineers' attention. Unlike regular FTP where
you login with a preconfigured Linux username and password, anonymous FTP requires only a
username of anonymous and your email address for the password. Once logged in to a VSFTPD
server, you automatically have access to only the default anonymous FTP directory (/var/ftp in
the case of VSFTPD) and all its subdirectories.
As seen in Chapter 6, "Installing Linux Software", using anonymous FTP as a remote user is
fairly straight forward. VSFTPD can be configured to support user-based and or anonymous FTP
in its configuration file which you'll see later.
FTP frequently fails when the data has to pass through a firewall, because firewalls are designed
to limit data flows to predictable TCP ports and FTP uses a wide range of unpredictable TCP
ports. You have a choice of methods to overcome this.
Note: The Appendix II, "Codes, Scripts, and Configurations", contains examples of how to
configure the VSFTPD Linux firewall to function with both active and passive FTP.
Typically firewalls don't allow any incoming connections at all, which frequently blocks active
FTP from functioning. With this type of FTP failure, the active FTP connection appears to work
when the client initiates an outbound connection to the server on port 21. The connection then
appears to hang, however, as soon as you use the ls, dir, or get commands. The reason is that the
firewall is blocking the return connection from the server to the client (from port 20 on the server
to a high port on the client). If a firewall allows all outbound connections to the Internet, then
passive FTP clients behind a firewall will usually work correctly as the clients initiate all the FTP
connections.
Solution
Table 15-1 shows the general rules you'll need to allow FTP clients through a firewall:
Typically firewalls don't let any connections come in at all. When a an incorrectly configured
firewall protects an FTP server, the FTP connection from the client doesn't appear to work at all
for both active and passive FTP.
Solution
4
FTP server 21 FTP client / High Established3
network 2
Allow server to establish data channel to remote client
Active FTP FTP server 20 FTP client / High New
network 2
FTP client / High FTP server 20 Established3
network 2
Passive FTP FTP client / High FTP server High New
network 2
FTP server High FTP client / High Established 3
network 2
1
Greater than 1024.
2
In some cases, you may want to allow all Internet users to have access, not just a
specific client server or network.
3
Many home-based firewall/routers automatically allow traffic for already established
connections. This rule may not be necessary in all cases.
Most Linux software products are available in a precompiled package format. Downloading and
installing packages isn't hard. If you need a refresher, Chapter 6, "Installing Linux Software",
covers how to do this in detail. It is best to use the latest version of VSFTPD.
When searching for the file, remember that the VSFTPD packages' filename usually starts with
the word vsftpd followed by a version number, as in vsftpd-1.2.1-5.i386.rpm for
Redhat/Fedora or vsftpd_2.0.4-0ubuntu4_i386.deb for Ubuntu.
With Fedora, Redhat, Ubunbtu and Debian You can start, stop, or restart VSFTPD after booting
by using these commands:
With Redhat / Fedora you can configure VSFTPD to start at boot you can use the chkconfig
command.
With Ubuntu / Debian the sysv-rc-conf command can be used like this:
5
root@u-bigboy:/tmp# sysv-rc-conf on
Note: In RedHat Linux version 8.0 and earlier, VSFTPD operation is controlled by the xinetd
process, which is covered in Chapter 16, "Telnet, TFTP, and xinetd". You can find a full
description of how to configure these versions of Linux for VSFTPD in Appendix III, "Fedora
Version Differences."
You can always test whether the VSFTPD process is running by using the netstat -a command
which lists all the TCP and UDP ports on which the server is listening for traffic. This example
shows the expected output.
VSFTPD only reads the contents of its vsftpd.conf configuration file only when it starts, so you'll
have to restart VSFTPD each time you edit the file in order for the changes to take effect. The
file may be located in either the /etc or the /etc/vsftpd directories depending on your Linux
distribution.
This file uses a number of default settings you need to know about.
VSFTPD runs as an anonymous FTP server. Unless you want any remote user to log into
to your default FTP directory using a username of anonymous and a password that's the
same as their email address, I would suggest turning this off. The configuration file's
anonymous_enable directive can be set to no to disable this feature. You'll also need to
simultaneously enable local users to be able to log in by removing the comment symbol
(#) before the local_enable instruction.
If you enable anonymous FTP with VSFTPD, remember to define the root directory that
visitors will visit. This is done with the anon_root directive.
anon_root=/data/directory
VSFTPD allows only anonymous FTP downloads to remote users, not uploads from
them. This can be changed by modifying the anon_upload_enable directive shown later.
VSFTPD doesn't allow anonymous users to create directories on your FTP server. You
can change this by modifying the anon_mkdir_write_enable directive.
6
VSFTPD logs FTP access to the /var/log/vsftpd.log log file. You can change this by
modifying the xferlog_file directive.
By default VSFTPD expects files for anonymous FTP to be placed in the /var/ftp
directory. You can change this by modifying the anon_root directive. There is always the
risk with anonymous FTP that users will discover a way to write files to your anonymous
FTP directory. You run the risk of filling up your /var partition if you use the default
setting. It is best to make the anonymous FTP directory reside in its own dedicated
partition.
The configuration file is fairly straight forward as you can see in the snippet below where we
enable anonymous FTP and individual accounts simultaneously.
To activate or deactivate a feature, remove or add the # at the beginning of the appropriate line.
7
Other vsftpd.conf Options
There are many other options you can add to this file:
Descriptions on this and more can be found in the vsftpd.conf man pages.
FTP has a number of security drawbacks, but you can overcome them in some cases. You can
restrict an individual Linux user's access to non-anonymous FTP, and you can change the
configuration to not display the FTP server's software version information, but unfortunately,
though very convenient, FTP logins and data transfers are not encrypted.
For added security, you may restrict FTP access to certain users by adding them to the list of
users in the /etc/vsftpd.ftpusers file. The VSFTPD package creates this file with a number of
entries for privileged users that normally shouldn't have FTP access. As FTP doesn't encrypt
passwords, thereby increasing the risk of data or passwords being compromised, it is a good idea
to let these entries remain and add new entries for additional security.
Anonymous Upload
If you want remote users to write data to your FTP server, then you should create a write-only
directory within /var/ftp/pub. This will allow your users to upload but not access other files
uploaded by other users. The commands you need are:
Change the default greeting banner in the vsftpd.conf file to make it harder for malicious users to
determine the type of system you have. The directive in this file is.
One of the disadvantages of FTP is that it does not encrypt your username and password. This
could make your user account vulnerable to an unauthorized attack from a person eavesdropping
8
on the network connection. Secure Copy (SCP) and Secure FTP (SFTP) provide encryption and
could be considered as an alternative to FTP for trusted users. SCP does not support anonymous
services, however, a feature that FTP does support.
Troubleshooting FTP
You should always test your FTP installation by attempting to use an FTP client to log in to your
FTP server to transfer sample files.
The most common sources of day-to-day failures are incorrect usernames and passwords.
Initial setup failures could be caused by firewalls along the path between the client and server
blocking some or all types of FTP traffic. Typical symptoms of this are either connection
timeouts or the ability to use the ls command to view the contents of a directory without the
ability to either upload or download files. Follow the firewall rule guidelines to help overcome
this problem. Connection problems could also be the result of typical network issues outlined in
Chapter 4, "Simple Network Troubleshooting".
Tutorial
FTP has many uses, one of which is allowing numerous unknown users to download files. You
have to be careful, because you run the risk of accidentally allowing unknown persons to upload
files to your server. This sort of unintended activity can quickly fill up your hard drive with
illegal software, images, and music for the world to download, which in turn can clog your
server's Internet access and drive up your bandwidth charges.
In this example, anonymous FTP is not desired, but a group of trusted users need to have read
only access to a directory for downloading files. Here are the steps:
1) Disable anonymous FTP. Comment out the anonymous_enable line in the vsftpd.conf file like
this:
2) Enable individual logins by making sure you have the local_enable line uncommented in the
vsftpd.conf file like this:
3) Start VSFTP.
9
4) Create a user group and shared directory. In this case, use /home/ftp-users and a user group
name of ftp-users for the remote users
8) Change the permissions of the files in the /home/ftp-docs directory for read only access by the
group
Remember, you must restart VSFTPD for the configuration file changes to take effect.
Here is a simple test procedure you can use to make sure everything is working correctly:
1) Check for the presence of a test file on the ftp client server.
[root@smallfry tmp]# ll
total 1
-rw-r--r-- 1 root root 0 Jan 4 09:08 testfile
[root@smallfry tmp]#
10
Connected to 192.168.1.100 (192.168.1.100)
220 ready, dude (vsFTPd 1.1.0: beat me, break me)
Name (192.168.1.100:root): user1
331 Please specify the password.
Password:
230 Login successful. Have fun.
Remote system type is UNIX.
Using binary mode to transfer files.
ftp>
As expected, we can't do an upload transfer of testfile to bigboy.
ftp> put testfile
local: testfile remote: testfile
227 Entering Passive Mode (192,168,1,100,181,210)
553 Could not create file.
ftp>
But we can view and download a copy of the VSFTPD RPM located on the FTP server
bigboy.
ftp> ls
227 Entering Passive Mode (192,168,1,100,35,173)
150 Here comes the directory listing.
-rwxr----- 1 0 502 76288 Jan 04 17:06 vsftpd-1.1.0-1.i386.rpm
226 Directory send OK.
ftp> get vsftpd-1.1.0-1.i386.rpm vsftpd-1.1.0-1.i386.rpm.tmp
local: vsftpd-1.1.0-1.i386.rpm.tmp remote: vsftpd-1.1.0-1.i386.rpm
227 Entering Passive Mode (192,168,1,100,44,156)
150 Opening BINARY mode data connection for vsftpd-1.1.0-1.i386.rpm (76288
bytes).
226 File send OK.
76288 bytes received in 0.499 secs (1.5e+02 Kbytes/sec)
ftp> exit
221 Goodbye.
[root@smallfry tmp]#
As expected, anonymous FTP fails.
[root@smallfry tmp]# ftp 192.168.1.100
Connected to 192.168.1.100 (192.168.1.100)
220 ready, dude (vsFTPd 1.1.0: beat me, break me)
Name (192.168.1.100:root): anonymous
331 Please specify the password.
Password:
530 Login incorrect.
Login failed.
ftp> quit
221 Goodbye.
[root@smallfry tmp]#
Now that testing is complete, you can make this a regular part of your FTP server's operation.
Conclusion ## FTP is a very useful software application that can have enormous benefit to a
Web site or to collaborative computing in which files need to be shared between business
partners. Although insecure, it is universally accessible, because FTP clients are a part of all
operating systems and Web browsers. If data encryption security is of great importance to you,
then you should probably consider SCP as a possible alternative. You can find more information
on it in Chapter 17, "Secure Remote Logins and File Copying".
11
Ubuntu Linux vsftpd ftp service / server install,
configuration howto
A. Ubuntu Linux comes with various ftp servers to setup FTP service such as:
=> proftpd - Versatile, virtual-hosting FTP daemon
I recommend using vsftpd. It is simple and quite secure FTP server. According to vsftpd man
page:
vsftpd is the Very Secure File Transfer Protocol Daemon. The server can be launched via a
super-server such as inetd or xinetd. Alternatively, vsftpd can be launched in standalone mode, in
which case vsftpd itself will listen on the network.
Password:
12
Reading package lists... Done
Building dependency tree
Reading state information... Done
The following NEW packages will be installed:
vsftpd
0 upgraded, 1 newly installed, 0 to remove and 0 not upgraded.
Need to get 121kB of archives.
After unpacking 438kB of additional disk space will be used.
Get:1 http://us.archive.ubuntu.com edgy/main vsftpd 2.0.4-0ubuntu5
[121kB]
Fetched 121kB in 0s (246kB/s)
Selecting previously deselected package vsftpd.
(Reading database ... 31396 files and directories currently
installed.)
Unpacking vsftpd (from .../vsftpd_2.0.4-0ubuntu5_amd64.deb) ...
Setting up vsftpd (2.0.4-0ubuntu5) ...
Adding system user `ftp' with uid 106...
Adding new user `ftp' (106) with group `nogroup'.
Not creating home directory `/home/ftp'.
* Starting FTP server: vsftpd
The default vsftpd configuration file is /etc/vsftpd.conf. You need to edit this file using text
editor such as vi:
$ sudo vi /etc/vsftpd.conf
Add the following line (uncomment line) to the vsftpd configuration file:
local_enable=YES
Above config directive will allow local users to log in via ftp
If you would like to allow users to upload file, add the following to the file:
write_enable=YES
For security you may restrict local users to their home directories. Add the following to the file:
chroot_local_user=YES
13
* Starting FTP server: vsftpd
[ ok ]
Now you should be able to FTP to this server with any account that exists on the system except
for the root user. From Windows or other Linux system use ftp client, type the command:
$ ftp ftp.nixcraft.in
Output:
Connected to ftp.nixcraft.in.
220 (vsFTPd 2.0.4)
Name (ftp.nixcraft.in:vivek): vivek
331 Please specify the password.
Password:
230 Login successful.
Remote system type is UNIX.
Using binary mode to transfer files.
ftp> pwd
257 "/"
ftp> ls
200 PORT command successful. Consider using PASV.
150 Here comes the directory listing.
-rw-r--r-- 1 1000 1000 91798 Aug 16 08:26 apf-
current.tar.gz
-rwxr-xr-x 1 1000 1000 156 Nov 10 07:05 iptables.stop
drwxr-xr-x 3 0 0 4096 Dec 23 11:11 postfix
-rw-r--r-- 1 0 0 10481942 Nov 29 23:35
webmin_1.310_all.deb
226 Directory send OK.
ftp> quit
221 Goodbye.
Add following rules to your iptables script. Assuming that default incoming policy is drop. If
protocol is TCP and destination port is 21 (ftp):
iptables -A INPUT -p tcp -m tcp --dport 21 -j ACCEPT.
There are a large number of other configuration options available for vsftpd that can be used to
fine tune ftp server. Read vsftpd.conf man page by typing following command:
$ man vsftpd.conf
14
15