0% found this document useful (0 votes)
54 views

File Transfer Protocol

The document describes the File Transfer Protocol (FTP), including its history, development, purpose, components, operations, security considerations, and related protocols. FTP is a standard network protocol used for transferring computer files between a client and server. It uses separate connections for control commands and data transfer and supports both anonymous and authenticated access.

Uploaded by

Yuvaraj Bhadury
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
54 views

File Transfer Protocol

The document describes the File Transfer Protocol (FTP), including its history, development, purpose, components, operations, security considerations, and related protocols. FTP is a standard network protocol used for transferring computer files between a client and server. It uses separate connections for control commands and data transfer and supports both anonymous and authenticated access.

Uploaded by

Yuvaraj Bhadury
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

File Transfer Protocol

The File Transfer Protocol (FTP) is a standard communication


protocol used for the transfer of computer files from a server to a File Transfer Protocol
client on a computer network. FTP is built on a client–server model Communication protocol
architecture using separate control and data connections between the Purpose File transfer
client and the server.[1] FTP users may authenticate themselves with a
clear-text sign-in protocol, normally in the form of a username and Developer(s) Abhay Bhushan for
password, but can connect anonymously if the server is configured to RFC 959
allow it. For secure transmission that protects the username and Introduced April 16, 1971
password, and encrypts the content, FTP is often secured with
OSI layer Application layer
SSL/TLS (FTPS) or replaced with SSH File Transfer Protocol
(SFTP). Port(s) 21 for control, 20 for
data transfer
The first FTP client applications were command-line programs
RFC(s) RFC 959
developed before operating systems had graphical user interfaces, and
are still shipped with most Windows, Unix, and Linux operating
systems.[2][3] Many FTP clients and automation utilities have since been developed for desktops, servers,
mobile devices, and hardware, and FTP has been incorporated into productivity applications, such as HTML
editors.

In January 2021, support for the FTP protocol was disabled in Google Chrome (as of version 88),[4] and has
also been disabled in other major browsers, such as Firefox (as of version 88.0).[5]

Contents
History of FTP servers
Protocol overview
Communication and data transfer
NAT and firewall traversal
Data types
File structures
Data transfer modes
Additional commands
Login
Anonymous FTP
Differences from HTTP
Web browser support
Syntax
Security
FTP over SSH
Derivatives
FTPS
SSH File Transfer Protocol
Trivial File Transfer Protocol
Simple File Transfer Protocol
FTP commands
FTP reply codes
See also
References
Further reading
External links

History of FTP servers


The original specification for the File Transfer Protocol was written by Abhay Bhushan and published as
RFC 114 (https://datatracker.ietf.org/doc/html/rfc114) on 16 April 1971. Until 1980, FTP ran on NCP, the
predecessor of TCP/IP.[2] The protocol was later replaced by a TCP/IP version, RFC 765 (https://datatracker.i
etf.org/doc/html/rfc765) (June 1980) and RFC 959 (https://datatracker.ietf.org/doc/html/rfc959) (October
1985), the current specification. Several proposed standards amend RFC 959 (https://datatracker.ietf.org/doc/ht
ml/rfc959), for example RFC 1579 (https://datatracker.ietf.org/doc/html/rfc1579) (February 1994) enables
Firewall-Friendly FTP (passive mode), RFC 2228 (https://datatracker.ietf.org/doc/html/rfc2228) (June 1997)
proposes security extensions, RFC 2428 (https://datatracker.ietf.org/doc/html/rfc2428) (September 1998) adds
support for IPv6 and defines a new type of passive mode.[6]

Protocol overview

Communication and data transfer

FTP may run in active or passive mode, which determines how the
data connection is established.[7] (This sense of "mode" is different
from that of the MODE command in the FTP protocol, and
corresponds to the PORT/PASV/EPSV/etc commands instead.) In
both cases, the client creates a TCP control connection from a
random, usually an unprivileged, port N to the FTP server command
port 21.

In active mode, the client starts listening for incoming data


connections from the server on port M. It sends the FTP
command PORT M to inform the server on which port it is
listening. The server then initiates a data channel to the
client from its port 20, the FTP server data port.
In situations where the client is behind a firewall and
unable to accept incoming TCP connections, passive Illustration of starting a passive
mode may be used. In this mode, the client uses the control connection using port 21
connection to send a PASV command to the server and
then receives a server IP address and server port number
from the server,[7] which the client then uses to open a data connection from an arbitrary client
port to the server IP address and server port number received.[8]
Both modes were updated in September 1998 to support IPv6. Further changes were introduced to the passive
mode at that time, updating it to extended passive mode.[9]

The server responds over the control connection with three-digit status codes in ASCII with an optional text
message. For example, "200" (or "200 OK") means that the last command was successful. The numbers
represent the code for the response and the optional text represents a human-readable explanation or request
(e.g. <Need account for storing file>).[1] An ongoing transfer of file data over the data connection can be
aborted using an interrupt message sent over the control connection.

FTP needs two ports (one for sending and one for receiving) because it was originally designed to operate on
Network Control Program (NCP), which was a simplex protocol that utilized two port addresses, establishing
two connections, for two-way communications. An odd and an even port were reserved for each application
layer application or protocol. The standardization of TCP and UDP reduced the need for the use of two
simplex ports for each application down to one duplex port,[10]:15 but the FTP protocol was never altered to
only use one port, and continued using two for backwards compatibility.

NAT and firewall traversal

FTP normally transfers data by having the server connect back to the client, after the PORT command is sent
by the client. This is problematic for both NATs and firewalls, which do not allow connections from the
Internet towards internal hosts.[11] For NATs, an additional complication is that the representation of the IP
addresses and port number in the PORT command refer to the internal host's IP address and port, rather than
the public IP address and port of the NAT.

There are two approaches to solve this problem. One is that the FTP client and FTP server use the PASV
command, which causes the data connection to be established from the FTP client to the server.[11] This is
widely used by modern FTP clients. Another approach is for the NAT to alter the values of the PORT
command, using an application-level gateway for this purpose.[11]

Data types

While transferring data over the network, four data types are defined:[2][3][6]

ASCII (TYPE A): Used for text. Data is converted, if needed, from the sending host's character
representation to "8-bit ASCII" before transmission, and (again, if necessary) to the receiving
host's character representation. As a consequence, this mode is inappropriate for files that
contain data other than plain text.
Image (TYPE I, commonly called Binary mode): The sending machine sends each file byte by
byte, and the recipient stores the bytestream as it receives it. (Image mode support has been
recommended for all implementations of FTP).
EBCDIC (TYPE E): Used for plain text between hosts using the EBCDIC character set.
Local (TYPE L n): Designed to support file transfer between machines which do not use 8-bit
bytes, e.g. 36-bit systems such as DEC PDP-10s. For example, "TYPE L 9" would be used to
transfer data in 9-bit bytes, or "TYPE L 36" to transfer 36-bit words. Most contemporary FTP
clients/servers only support L 8, which is equivalent to I.

An expired Internet Draft defined a TYPE U for transferring Unicode text files using UTF-8;[12] although the
draft never became an RFC, it has been implemented by several FTP clients/servers.
Note these data types are commonly called "modes", although ambiguously that word is also used to refer to
active-vs-passive communication mode (see above), and the modes set by the FTP protocol MODE command
(see below).

For text files (TYPE A and TYPE E), three different format control options are provided, to control how the
file would be printed:

Non-print (TYPE A N and TYPE E N) – the file does not contain any carriage control characters
intended for a printer
Telnet (TYPE A T and TYPE E T) – the file contains Telnet (or in other words, ASCII C0)
carriage control characters (CR, LF, etc)
ASA (TYPE A A and TYPE E A) – the file contains ASA carriage control characters

These formats were mainly relevant to line printers; most contemporary FTP clients/servers only support the
default format control of N.

File structures

File organization is specified using the STRU command. The following file structures are defined in section
3.1.1 of RFC959:

F or FILE structure (stream-oriented). Files are viewed as an arbitrary sequence of bytes,


characters or words. This is the usual file structure on Unix systems and other systems such as
CP/M, MSDOS and Microsoft Windows. (Section 3.1.1.1)
R or RECORD structure (record-oriented). Files are viewed as divided into records, which may
be fixed or variable length. This file organization is common on mainframe and midrange
systems, such as MVS, VM/CMS, OS/400 and VMS, which support record-oriented filesystems.
P or PAGE structure (page-oriented). Files are divided into pages, which may either contain
data or metadata; each page may also have a header giving various attributes. This file
structure was specifically designed for TENEX systems, and is generally not supported on
other platforms. RFC1123 section 4.1.2.3 recommends that this structure not be implemented.

Most contemporary FTP clients and servers only support STRU F. STRU R is still in use in mainframe and
minicomputer file transfer applications.

Data transfer modes

Data transfer can be done in any of three modes:[1][2]

Stream mode (MODE S): Data is sent as a continuous stream, relieving FTP from doing any
processing. Rather, all processing is left up to TCP. No End-of-file indicator is needed, unless
the data is divided into records.
Block mode (MODE B): Designed primarily for transferring record-oriented files (STRU R),
although can also be used to transfer stream-oriented (STRU F) text files. FTP puts each
record (or line) of data into several blocks (block header, byte count, and data field) and then
passes it on to TCP.[6]
Compressed mode (MODE C): Extends MODE B with data compression using run-length
encoding.

Most contemporary FTP clients and servers do not implement MODE B or MODE C; FTP clients and servers
for mainframe and minicomputer operating systems are the exception to that.
Some FTP software also implements a DEFLATE-based compressed mode, sometimes called "Mode Z" after
the command that enables it. This mode was described in an Internet Draft, but not standardized.[13]

GridFTP defines additional modes, MODE E[14] and MODE X,[15] as extensions of MODE B.

Additional commands

More recent implementations of FTP support the Modify Fact: Modification Time (MFMT) command, which
allows a client to adjust that file attribute remotely, enabling the preservation of that attribute when uploading
files.[16][17]

To retrieve a remote file timestamp, there's MDTM command. Some servers (and clients) support nonstandard
syntax of the MDTM command with two arguments, that works the same way as MFMT[18]

Login
FTP login uses normal username and password scheme for granting access.[2] The username is sent to the
server using the USER command, and the password is sent using the PASS command.[2] This sequence is
unencrypted "on the wire", so may be vulnerable to a network sniffing attack.[19] If the information provided
by the client is accepted by the server, the server will send a greeting to the client and the session will
commence.[2] If the server supports it, users may log in without providing login credentials, but the same
server may authorize only limited access for such sessions.[2]

Anonymous FTP

A host that provides an FTP service may provide anonymous FTP access.[2] Users typically log into the
service with an 'anonymous' (lower-case and case-sensitive in some FTP servers) account when prompted for
user name. Although users are commonly asked to send their email address instead of a password,[3] no
verification is actually performed on the supplied data.[20] Many FTP hosts whose purpose is to provide
software updates will allow anonymous logins.[3]

Differences from HTTP


HTTP essentially fixes the bugs in FTP that made it inconvenient to use for many small ephemeral transfers as
are typical in web pages.

FTP has a stateful control connection which maintains a current working directory and other flags, and each
transfer requires a secondary connection through which the data are transferred. In "passive" mode this
secondary connection is from client to server, whereas in the default "active" mode this connection is from
server to client. This apparent role reversal when in active mode, and random port numbers for all transfers, is
why firewalls and NAT gateways have such a hard time with FTP. HTTP is stateless and multiplexes control
and data over a single connection from client to server on well-known port numbers, which trivially passes
through NAT gateways and is simple for firewalls to manage.

Setting up an FTP control connection is quite slow due to the round-trip delays of sending all of the required
commands and awaiting responses, so it is customary to bring up a control connection and hold it open for
multiple file transfers rather than drop and re-establish the session afresh each time. In contrast, HTTP
originally dropped the connection after each transfer because doing so was so cheap. While HTTP has
subsequently gained the ability to reuse the TCP connection for multiple transfers, the conceptual model is still
of independent requests rather than a session.

When FTP is transferring over the data connection, the control connection is idle. If the transfer takes too long,
the firewall or NAT may decide that the control connection is dead and stop tracking it, effectively breaking
the connection and confusing the download. The single HTTP connection is only idle between requests and it
is normal and expected for such connections to be dropped after a time-out.

Web browser support


Most common web browsers can retrieve files hosted on FTP servers, although they may not support protocol
extensions such as FTPS.[3][21] When an FTP—rather than an HTTP—URL is supplied, the accessible
contents on the remote server are presented in a manner that is similar to that used for other web content. A
full-featured FTP client can be run within Firefox in the form of an extension called FireFTP.

As of 2019, major browsers such as Chrome and Firefox are deprecating FTP support to varying degrees.[22]
Google removed it entirely in Chrome 88.[23] As of 2019, Mozilla was discussing proposals, including only
removing support for old FTP implementations that are no longer in use to simplify their code.[24][25] As of
April, 2021 and Firefox Release 88.0, Mozilla disabled FTP support for Firefox, and was planning for
removing it fully in a later release.[26]

Syntax

FTP URL syntax is described in RFC 1738 (https://datatracker.ietf.org/doc/html/rfc1738), taking the form:
ftp://[user[:password]@]host[:port]/url-path (the bracketed parts are optional).

For example, the URL ftp://public.ftp-servers.example.com/mydirectory/myfile.txt represents the file myfile.txt


from the directory mydirectory on the server public.ftp-servers.example.com as an FTP resource. The URL
ftp://user001:[email protected]/mydirectory/myfile.txt adds a specification of
the username and password that must be used to access this resource.

More details on specifying a username and password may be found in the browsers' documentation (e.g.,
Firefox[27] and Internet Explorer[28]). By default, most web browsers use passive (PASV) mode, which more
easily traverses end-user firewalls.

Some variation has existed in how different browsers treat path resolution in cases where there is a non-root
home directory for a user.[29]

Security
FTP was not designed to be a secure protocol, and has many security weaknesses.[30] In May 1999, the
authors of RFC 2577 (https://datatracker.ietf.org/doc/html/rfc2577) listed a vulnerability to the following
problems:

Brute-force attack
FTP bounce attack
Packet capture
Port stealing (guessing the next open port and usurping a legitimate connection)
Spoofing attack
Username enumeration
DoS or DDoS

FTP does not encrypt its traffic; all transmissions are in clear text, and usernames, passwords, commands and
data can be read by anyone able to perform packet capture (sniffing) on the network.[2][30] This problem is
common to many of the Internet Protocol specifications (such as SMTP, Telnet, POP and IMAP) that were
designed prior to the creation of encryption mechanisms such as TLS or SSL.[6]

Common solutions to this problem include:

1. Using the secure versions of the insecure protocols, e.g., FTPS instead of FTP and TelnetS
instead of Telnet.
2. Using a different, more secure protocol that can handle the job, e.g. SSH File Transfer Protocol
or Secure Copy Protocol.
3. Using a secure tunnel such as Secure Shell (SSH) or virtual private network (VPN).

FTP over SSH

FTP over SSH is the practice of tunneling a normal FTP session over a Secure Shell connection.[30] Because
FTP uses multiple TCP connections (unusual for a TCP/IP protocol that is still in use), it is particularly difficult
to tunnel over SSH. With many SSH clients, attempting to set up a tunnel for the control channel (the initial
client-to-server connection on port 21) will protect only that channel; when data is transferred, the FTP
software at either end sets up new TCP connections (data channels) and thus have no confidentiality or
integrity protection.

Otherwise, it is necessary for the SSH client software to have specific knowledge of the FTP protocol, to
monitor and rewrite FTP control channel messages and autonomously open new packet forwardings for FTP
data channels. Software packages that support this mode include:

Tectia ConnectSecure (Win/Linux/Unix)[31] of SSH Communications Security's software suite

Derivatives

FTPS

Explicit FTPS is an extension to the FTP standard that allows clients to request FTP sessions to be encrypted.
This is done by sending the "AUTH TLS" command. The server has the option of allowing or denying
connections that do not request TLS. This protocol extension is defined in RFC 4217 (https://datatracker.ietf.or
g/doc/html/rfc4217). Implicit FTPS is an outdated standard for FTP that required the use of a SSL or TLS
connection. It was specified to use different ports than plain FTP.

SSH File Transfer Protocol

The SSH file transfer protocol (chronologically the second of the two protocols abbreviated SFTP) transfers
files and has a similar command set for users, but uses the Secure Shell protocol (SSH) to transfer files. Unlike
FTP, it encrypts both commands and data, preventing passwords and sensitive information from being
transmitted openly over the network. It cannot interoperate with FTP software.
Trivial File Transfer Protocol

Trivial File Transfer Protocol (TFTP) is a simple, lock-step FTP that allows a client to get a file from or put a
file onto a remote host. One of its primary uses is in the early stages of booting from a local area network,
because TFTP is very simple to implement. TFTP lacks security and most of the advanced features offered by
more robust file transfer protocols such as File Transfer Protocol. TFTP was first standardized in 1981 and the
current specification for the protocol can be found in RFC 1350 (https://datatracker.ietf.org/doc/html/rfc1350).

Simple File Transfer Protocol

Simple File Transfer Protocol (the first protocol abbreviated SFTP), as defined by RFC 913 (https://datatracke
r.ietf.org/doc/html/rfc913), was proposed as an (unsecured) file transfer protocol with a level of complexity
intermediate between TFTP and FTP. It was never widely accepted on the Internet, and is now assigned
Historic status by the IETF. It runs through port 115, and often receives the initialism of SFTP. It has a
command set of 11 commands and support three types of data transmission: ASCII, binary and continuous.
For systems with a word size that is a multiple of 8 bits, the implementation of binary and continuous is the
same. The protocol also supports login with user ID and password, hierarchical folders and file management
(including rename, delete, upload, download, download with overwrite, and download with append).

FTP commands

FTP reply codes


Below is a summary of FTP reply codes that may be returned by an FTP server. These codes have been
standardized in RFC 959 (https://datatracker.ietf.org/doc/html/rfc959) by the IETF. The reply code is a three-
digit value. The first digit is used to indicate one of three possible outcomes — success, failure, or to indicate
an error or incomplete reply:

2yz – Success reply


4yz or 5yz – Failure reply
1yz or 3yz – Error or Incomplete reply

The second digit defines the kind of error:

x0z – Syntax. These replies refer to syntax errors.


x1z – Information. Replies to requests for information.
x2z – Connections. Replies referring to the control and data connections.
x3z – Authentication and accounting. Replies for the login process and accounting procedures.
x4z – Not defined.
x5z – File system. These replies relay status codes from the server file system.

The third digit of the reply code is used to provide additional detail for each of the categories defined by the
second digit.

See also
Comparison of FTP client software Comparison of file transfer protocols
Comparison of FTP server software Curl-loader – FTP/S loading/testing open-
packages source software
File eXchange Protocol (FXP) List of FTP server return codes
File Service Protocol (FSP) Managed File Transfer
FTAM OBEX
FTPFS Shared file access
List of FTP commands TCP Wrapper

References
1. Forouzan, B.A. (2000). TCP/IP: Protocol Suite (1st ed.). New Delhi, India: Tata McGraw-Hill
Publishing Company Limited.
2. Kozierok, Charles M. (2005). "The TCP/IP Guide v3.0" (http://www.tcpipguide.com/free/t_FTPO
verviewHistoryandStandards.htm). Tcpipguide.com.
3. Dean, Tamara (2010). Network+ Guide to Networks. Delmar. pp. 168–171.
4. "Deprecations and removals in Chrome 87" (https://developers.google.com/web/updates/2020/
10/chrome-87-deps-rems). Retrieved 18 November 2020.
5. "Firefox 88.0, See All New Features, Updates and Fixes" (https://www.mozilla.org/en-US/firefo
x/88.0/releasenotes/). Retrieved 23 April 2021.
6. Clark, M.P. (2003). Data Networks IP and the Internet (1st ed.). West Sussex, England: John
Wiley & Sons Ltd.
7. "Active FTP vs. Passive FTP, a Definitive Explanation" (http://slacksite.com/other/ftp.html).
Slacksite.com.
8. RFC 959 (https://datatracker.ietf.org/doc/html/rfc959) (Standard) File Transfer Protocol (FTP).
Postel, J. & Reynolds, J. (October 1985).
9. RFC 2428 (https://datatracker.ietf.org/doc/html/rfc2428) (Proposed Standard) Extensions for
IPv6, NAT, and Extended Passive Mode. Allman, M. & Metz, C. & Ostermann, S. (September
1998).
10. Stevens, W. Richard (1994). TCP/IP Illustrated Volume I. 1. Reading, Massachusetts, USA:
Addison-Wesley Publishing Company. ISBN 0-201-63346-9.
11. Gleason, Mike (2005). "The File Transfer Protocol and Your Firewall/NAT" (https://www.ncftp.co
m/ncftpd/doc/misc/ftp_and_firewalls.html). Ncftp.com.
12. Klensin, John. FTP TYPE Extension for Internationalized Text (https://tools.ietf.org/html/draft-kl
ensin-ftpext-typeu-00). I-D draft-klensin-ftpext-typeu-00. Retrieved 9 June 2020.
13. Preston, J. (January 2005). Deflate transmission mode for FTP (https://tools.ietf.org/html/draft-pr
eston-ftpext-deflate-03). IETF. I-D draft-preston-ftpext-deflate-03. Retrieved 27 January 2016.
14. Allcock, W. (April 2003). "GridFTP: Protocol Extensions to FTP for the Grid" (https://www.ogf.or
g/documents/GFD.20.pdf) (PDF).
15. Mandrichenko, I. (4 May 2005). "GridFTP v2 Protocol Description" (https://www.ogf.org/docume
nts/GFD.47.pdf) (PDF).
16. "MFMT FTP command" (https://support.solarwinds.com/SuccessCenter/s/article/MFMT-FTP-co
mmand). support.solarwinds.com. 11 October 2018.
17. "FTP Commands: DSIZ, MFCT, MFMT, AVBL, PASS, XPWD, XMKD | Serv-U" (https://www.ser
v-u.com/resource/tutorial/dsiz-mfct-mfmt-avbl-pass-xpwd-xmkd-ftp-command). www.serv-u.com.
18. "MDTM FTP command" (https://support.solarwinds.com/SuccessCenter/s/article/MDTM-FTP-c
ommand). support.solarwinds.com. 11 October 2018.
19. Prince, Brian. "Should Organizations Retire FTP for Security?" (https://www.securityweek.com/
should-organizations-retire-ftp-security). Security Week. Security Week. Retrieved
14 September 2017.
20. RFC 1635 (https://datatracker.ietf.org/doc/html/rfc1635) (Informational) How to Use Anonymous
FTP. P. & Emtage, A. & Marine, A. (May 1994).
21. Matthews, J. (2005). Computer Networking: Internet Protocols in Action (1st ed.). Danvers, MA:
John Wiley & Sons Inc.
22. Abrams, Lawrence (26 November 2018). "Chrome and Firefox Developers Aim to Remove
Support for FTP" (https://www.bleepingcomputer.com/news/google/chrome-and-firefox-develop
ers-aim-to-remove-support-for-ftp/). bleepingcomputer.com. Retrieved 26 January 2020.
23. Sneddon, Joey (26 January 2021). "Linux Release Roundup: GParted, Lightworks, Google
Chrome + More" (https://www.omgubuntu.co.uk/2021/01/linux-release-roundup-chrome-lightwo
rks-more). omgubuntu.co.uk. Retrieved 30 January 2021.
24. "1574475 - Remove FTP support" (https://bugzilla.mozilla.org/show_bug.cgi?id=1574475).
25. "Deprecate FTP support - Chrome Platform Status" (https://www.chromestatus.com/feature/624
6151319715840).
26. "See what's new in Firefox: 88.0 Firefox Release" (https://www.mozilla.org/en-US/firefox/88.0/r
eleasenotes/). mozilla.org. 19 April 2021. Retrieved 20 April 2021.
27. "Accessing FTP servers | How to | Firefox Help" (https://support.mozilla.org/en-US/kb/Accessin
g%20FTP%20servers#w_ftp-servers-that-require-a-username-and-password).
Support.mozilla.com. 5 September 2012. Retrieved 16 January 2013.
28. How to Enter FTP Site Password in Internet Explorer (https://web.archive.org/web/2015070200
5840/https://support.microsoft.com/en-us/kb/135975) at the Wayback Machine (archived 2 July
2015) Written for IE versions 6 and earlier. Might work with newer versions.
29. Jukka “Yucca” Korpela (18 September 1997). "FTP URLs" (http://jkorpela.fi/ftpurl.html). "IT and
communication" (jkorpela.fi). Retrieved 26 January 2020.
30. "Securing FTP using SSH" (https://nurdletech.com/linux-notes/ftp/ssh.html). Nurdletech.com.
31. "Components of the Information Assurance Platform (section Tectia ConnectSecure)" (https://w
ww.ssh.com/manuals/mft-events-product/63/ssh-solutions-your-business-components.html).
ssh.com.

Further reading
RFC 697 (https://datatracker.ietf.org/doc/html/rfc697) – CWD Command of FTP. July 1975.
RFC 959 (https://datatracker.ietf.org/doc/html/rfc959) – (Standard) File Transfer Protocol (FTP).
J. Postel, J. Reynolds. October 1985.
RFC 1579 (https://datatracker.ietf.org/doc/html/rfc1579) – (Informational) Firewall-Friendly FTP.
February 1994.
RFC 1635 (https://datatracker.ietf.org/doc/html/rfc1635) – (Informational) How to Use
Anonymous FTP. May 1994.
RFC 1639 (https://datatracker.ietf.org/doc/html/rfc1639) – FTP Operation Over Big Address
Records (FOOBAR). June 1994.
RFC 1738 (https://datatracker.ietf.org/doc/html/rfc1738) – Uniform Resource Locators (URL).
December 1994.
RFC 2228 (https://datatracker.ietf.org/doc/html/rfc2228) – (Proposed Standard) FTP Security
Extensions. October 1997.
RFC 2389 (https://datatracker.ietf.org/doc/html/rfc2389) – (Proposed Standard) Feature
negotiation mechanism for the File Transfer Protocol. August 1998.
RFC 2428 (https://datatracker.ietf.org/doc/html/rfc2428) – (Proposed Standard) Extensions for
IPv6, NAT, and Extended passive mode. September 1998.
RFC 2577 (https://datatracker.ietf.org/doc/html/rfc2577) – (Informational) FTP Security
Considerations. May 1999.
RFC 2640 (https://datatracker.ietf.org/doc/html/rfc2640) – (Proposed Standard)
Internationalization of the File Transfer Protocol. July 1999.
RFC 3659 (https://datatracker.ietf.org/doc/html/rfc3659) – (Proposed Standard) Extensions to
FTP. P. Hethmon. March 2007.
RFC 5797 (https://datatracker.ietf.org/doc/html/rfc5797) – (Proposed Standard) FTP Command
and Extension Registry. March 2010.
RFC 7151 (https://datatracker.ietf.org/doc/html/rfc7151) – (Proposed Standard) File Transfer
Protocol HOST Command for Virtual Hosts. March 2014.
IANA FTP Commands and Extensions registry (https://www.iana.org/assignments/ftp-command
s-extensions/ftp-commands-extensions.xhtml) – The official registry of FTP Commands and
Extensions

External links
Communication Networks/File Transfer Protocol at Wikibooks
FTP Server Online Tester (https://servertest.online/ftp) Authentication, encryption, mode and
connectivity.
Anonymous FTP Servers by Country Code TLD (2012): "Offbeat Internet - Public Access -
FTP" (https://www.jumpjet.info/Offbeat-Internet/Public/FTP/url.htm). www.jumpjet.info. 2012.
Retrieved 16 January 2020.

Retrieved from "https://en.wikipedia.org/w/index.php?title=File_Transfer_Protocol&oldid=1027814466"

This page was last edited on 10 June 2021, at 04:58 (UTC).

Text is available under the Creative Commons Attribution-ShareAlike License; additional terms may apply. By using this
site, you agree to the Terms of Use and Privacy Policy. Wikipedia® is a registered trademark of the Wikimedia
Foundation, Inc., a non-profit organization.

You might also like