How to establish a safe PROFTPD application experience

Source: Internet
Author: User

PROFTPD is aimed at the weak points of wu-ftp development, in addition to improved security, but also with many wu-ftp characteristics, can be stand-alone, xinetd mode of operation. ProFTP has become the most popular after wu-ftp FTP server software, more and more sites to choose it to build a safe and efficient FTP site, proftp configuration convenient, and there are MySQL and quota modules to choose from, The perfect combination of them enables the management of a system-limited account and user disk limitations.

First, the PROFTPD service faces the security hidden danger

The security risks of PROFTPD service include: Buffer overflow attack (buffering Overflow), data sniffing and anonymous access defects.

1. Buffer Overflow attack

For a long time, buffer overflow has become a problem of computer system. The most notable case of an attack using a computer buffer overflow vulnerability was the Morris worm, which took place in November 1988. But even if its harm is known, buffer overflow is still an important means of intrusion now. The concept of buffer overflow: buffer overflow is like putting 100 kilograms of cargo into a container that can only be loaded in 10 kg.

A buffer overflow vulnerability is a problem that has plagued security experts for more than 30 of years. In short, it is a memory error in the software that is caused by the programming mechanism. Such a memory error makes it possible for a hacker to run a malicious code to disrupt the system's normal operation and even gain control over the entire system.

2. Data sniffing

FTP is a traditional network service program, is inherently unsafe, because they send passwords and data in clear text on the network, it is very easy for the people with ulterior motives to intercept these passwords and data. Furthermore, the security authentication methods of these services have their own weaknesses, and are vulnerable to the "middleman" (Man-in-the-middle) attack in this manner.

The so-called "middleman" mode of attack, is the "middleman" impersonating a real server to receive the data you pass to the server, and then impersonate you to the data to the real server. When the data transfer between the server and you has been tampered with by the middleman, there will be serious problems. The main way to intercept these passwords is to brute force. In addition, using the sniffer program to monitor the network packet capture FTP start session information, you can easily intercept the root password.



Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.