PMS Information Systems
Welcome to PMS Information Systems - IBM i (AS/400) Forum !!!

Get Answers for all your queries on IBM i (AS/400).

Restrict FTP Access

Go down

Restrict FTP Access

Post  maran on Thu Sep 03, 2009 5:22 pm

How to restrict single user FTP access for AS/400 server?

Posts : 442
Join date : 2009-07-24

View user profile

Back to top Go down

Re: Restrict FTP Access

Post  sivakumar on Thu Sep 03, 2009 5:34 pm

Control FTP access

If you want to allow FTP clients to access your system, be aware of the following security concerns:

Your object authority scheme might not provide detailed enough protection when you allow FTP on your system. For example, when a user has the authority to view a file (*USE authority), the user can also copy the file to a PC or to another system. You might want to protect some files from being copied to another system.

You can use FTP exit programs to restrict the FTP operations that users can perform. You can use the FTP Request Validation Exit to control what operations you allow. For example, you can reject GET requests for specific database files.

You can use the Server logon exit point to authenticate users who log on to the FTP server. Configure Anonymous FTP describes how to use exit programs to set up support for Anonymous FTP on your system.

Unless you use TLS/SSL, FTP passwords are not encrypted when they are sent between the client system and the server system. Depending on your connection methods, your system may be vulnerable to password theft through line sniffing.

If the QMAXSGNACN system value is set to 1, the QMAXSIGN system value applies to TELNET but not to FTP. If QMAXSGNACN is set to 2 or 3 (values which disable the profile if the maximum sign on count is reached), FTP logon attempts are counted. In this case, a hacker can mount a denial of service attack through FTP by repeatedly attempting to log on with an incorrect password until the user profile is disabled.

For each unsuccessful attempt, the system writes message CPF2234 to the QHST log. You can write a program to monitor the QHST log for the message. If the program detects repeated attempts, it can end the FTP servers.

You can use the Inactivity timeout (INACTTIMO) parameter on the FTP configuration to reduce the exposure when a user leaves an FTP session unattended. Be sure to read the documentation or online help to understand how the INACTTIMO parameter and the connection timer (for server startup) work together. Note: The QINACTITV system value does not affect FTP sessions.

When you use FTP batch support, the program must send both the user ID and the password to the server system. Either the user ID and password must be coded in the program, or the program must retrieve them from a file. Both these options for storing passwords and user IDs represent a potential security exposure. If you use FTP batch, you must ensure that you use object security to protect the user ID and password information. You should also use a single user ID that has limited authority on the target system. It should have only enough authority to perform the function that you want, such as file transfer.

FTP provides remote-command capability, just as advanced program-to-program communications (APPC) and iSeries Access do. The RCMD (Remote Command) FTP-server subcommand is the equivalent of having a command line on the system. Before you allow FTP, you must ensure that your object security scheme is adequate. You can also use the FTP exit program to limit or reject attempts to use the RCMD subcommand. FTP exit programs describes this exit point and provides sample programs.

A user can access objects in the integrated file system with FTP. Therefore, you need to ensure that your authority scheme for the integrated file system is adequate when you run the FTP server on your system.

A popular hacker activity is to set up an unsuspecting site as a repository for information. Sometimes, the information might be illegal or pornographic. If a hacker gains access to your site through FTP, the hacker uploads this undesirable information to your iSeries. The hacker then informs other hackers of your FTP address. They in turn access your iSeries with FTP and download the undesirable information.
You can use the FTP exit programs to help protect against this type of attack. For example, you might direct all requests to upload information to a directory that is write-only. This defeats the hacker's objective because the hacker's friends will not be able to download the information in the directory. AS/400R Internet Security: Protecting Your AS/400 from HARM on the Internet provides more information about the risks and possible solutions when you allow uploading through FTP.


Posts : 174
Join date : 2009-07-27
Age : 32
Location : Chennai

View user profile

Back to top Go down

Back to top

- Similar topics

Permissions in this forum:
You cannot reply to topics in this forum