SafeTP: Secure, Transparent, Interoperable FTP
نویسندگان
چکیده
SafeTP makes FTP traffic secure, transparent, and interoperable. Security – confidentiality, integrity, and authenticity – is provided by a hybrid public-key and shared-key cryptosystem. Transparency – the ability to use existing FTP software and make it secure – is achieved by the insertion of a proxy layer. Interoperability – compatibility with the installed base of insecure FTP clients and servers – is maintained by simply falling back on insecure protocols when necessary.
منابع مشابه
SafeTP: Transparently Securing FTP Network Services
One of the most challenging practical aspects of providing endto-end network security for legacy client-server protocols such as non-anonymous FTP (File Transfer Protocol) is convincing end users to actually use the secure alternatives, rather than abandoning them in favor of simpler, more familiar, or more fully featured insecure clients. A number of secure alternatives to the FTP protocol hav...
متن کاملTransparent authentication and confidentiality for stream sockets
PES, Privacy Enhanced Sockets, is a user-level subsystem providing network privacy for stream sockets. This document presents its design and implementation in UNIX and Microsoft Windows systems. PES provides secure channels on top of standard stream sockets, allowing existing client-server applications to transparently use secure channels instead of standard remote connections. PES is composed ...
متن کاملFTP Mirror Tracker: A Few Steps Towards URN
FTP Mirror Tracker1 is a software package (written in Perl and C++) that enables transparent, user-controlled redirection to the nearest anonymous FTP mirror sites that are exact replicas of the original source. This redirection can be achieved by using a Web Cache server or by making HTTP requests to the FTP Mirror Tracker directly. The Mirror Tracker also has internal URN support and can be u...
متن کاملSecure RPC Authentication (SRA) for TELNET and FTP
TELNET and FTP currently exchange user authentication (passwords) in plain text, which is easily eavesdropped. Several techniques, such as Kerberos and SPX, have been proposed in draft RFCs to implement secure authentication. These techniques, however, have several drawbacks, including technical complexity, poor vendor support, and organizational problems. This paper presents SRA, a very simple...
متن کاملAn Interoperable Payment Protocol for the Public Transit Fare Payment System
The market for the public transit fare payment system using contactless smart cards is rapidly growing, however, the payment systems provided by different vendors are not interoperable. This paper presents an interoperable payment protocol for the public transit fare payment system using contactless smart cards. We also present implementation results of a PSAM (Purchase Secure Application Modul...
متن کامل