Sonia,
This is clearly a problem that is specific to your implementation/configuration of
ftp. I have often ftp'd files containing many megabytes.
Jay Rosansky
ACS-GSG
> -----Original Message-----
> From: Zhu, Sonia [mailto:[EMAIL PROTECTED]]
> Sent: Friday, June 16, 2000 12:56 PM
> To: [EMAIL PROTECTED]%internet
> Subject: Re: Secure FTP using SSL
>
>
> Has anybody met this case: When using FTP "put" file to the
> server, there is
> a limitation for the file size, around 250 X 512 byte, if the
> file is bigger
> than that, FTP will hang up, and then exit with error:
> [Aborting data transfer]CONNCLOSED, Connection closed
> ABOR
>
> <451 Transfer aborted due to receive error. File is deleted.
> FTP>
>
> Any idea?
>
>
> Thanks,
> Sonia Zhu
> Information Systems Tel: (604)420-6611 ext 413
> Dairyland Foods Division Fax: (604)444-7203
>
>
> -----Original Message-----
> From: Rosansky, Jay [SMTP:[EMAIL PROTECTED]]
> Sent: Friday, June 16, 2000 6:09 AM
> To: [EMAIL PROTECTED]
> Subject: Re: Secure FTP using SSL
>
> > -----Original Message-----
> > From: Tzeweng Foong [mailto:[EMAIL PROTECTED]]
> > Sent: Thursday, June 15, 2000 9:14 PM
> > To: [EMAIL PROTECTED]%internet
> > Subject: Re: Secure FTP using SSL
> >
> >
> > > -----Original Message-----
> > > From: Rosansky, Jay [mailto:[EMAIL PROTECTED]]
> > > Sent: Friday, 16 June 2000 5:16
> > > To: [EMAIL PROTECTED]
> > > Subject: Re: Secure FTP using SSL
> > >
> > >
> > > Jonathan,
> > > Yes, the major difference is that the user ID and password
> > > are sent in the clear in plain ftp. But, this is not an
> > > issue because someone might read your data.
> (Can't without
> > > the recipient's private key.) And, it is not an
> issue because
> > > someone might send in a bogus message claiming to be you.
> > > (Can't because they can't forge your digital signature.)
> > >
> > > The only potential problem that I known of with
> using ftp and
> > > PGP happens if you use the ftp server to upload
> files to it.
> > > If someone stole the user ID and password they
> could harass
> > > you by uploading very large files to the server. This
> > > problem does not happen if the ftp server is only used for
> > downloads.
> >
> > You seem to have missed the potential for someone
> to take your
> > files from the FTP server you are downloading data
> from.. also
> > deleting the files waiting to be downloaded by you.
> >
>
> In this type set up the ftp server should be
> configured not to allow
> the ftp client to delete the file. (Easily done with file
> permissions or
> ftp server configuration.) The file should be removed by a
> process on the
> server at some appropriate time. Also, since the file is encrypted it
> doesn't matter who downloads it.
>
> > There is also a new ftp client and server (cannot
> remember exactly
> > what it is called, maybe sFTP ? ) that encrupts the
> user id and
> > password (but not the session..) this would make it
> fairly safe
> > to use PGP to encrypt the file.
> >
> > > The one problem with FTP/s (and why we ended up
> not using it)
> > > is it is not proxy firewall friendly. In order
> to use that
> > > program through a firewall it is either necessary to poke
> > > huge holes in the firewall or get FTP/s proxy software for
> > > the firewall. I don't know if this software exists yet.
> > > Another approach would be to setup your ftp/s
> client on a box
> > > outside your firewall and use some other method to get it
> > > through. Not a very appealing idea.
> > >
> > > Good luck,
> > > Jay Rosansky
> > > ACS-GSG
> > >
> > >
> > > > -----Original Message-----
> > > > From: [EMAIL PROTECTED]%internet
> > > > [mailto:[EMAIL PROTECTED]]
> > > > Sent: Thursday, June 15, 2000 2:16 PM
> > > > To: Rosansky, Jay
> > > > Cc: [EMAIL PROTECTED]%internet
> > > > Subject: Re: Secure FTP using SSL
> > > >
> > > >
> > > > Jay,
> > > > Thank you very much for the information.
> I do have a
> > > > follow-up questions.
> > > > If someone is using PGP(or some other file
> encryption tool)
> > > > to encrypt a file
> > > > that is sent using FTP versus FTP using SSL,
> what are the
> > > > major advantages and
> > > > disadvantages? Is it that using FTP and SSL
> will protect the
> > > > user id and
> > > > password being passed? Where "standard" FTP
> would pass that
> > > > in the "open"?
> > > >
> > > > Thanks
> > > > Jonathan Showalter
> > > >
> > > >
> > > >
> > > >
> > > > |--------+------------------------->
> > > > | | "Rosansky, Jay"|
> > > > | | <Jay.Rosansky@H|
> > > > | | Q.DOE.GOV> |
> > > > | | |
> > > > | | 06/15/2000 |
> > > > | | 10:51 AM |
> > > > | | Please respond |
> > > > | | to "Rosansky, |
> > > > | | Jay" |
> > > > | | |
> > > > |--------+------------------------->
> > > >
> > > >
> >-------------------------------------------------------------
> > > > ---------------|
> > > > |
> > > > |
> > > > | To: [EMAIL PROTECTED]
> > > > |
> > > > | cc: (bcc: Jonathan Showalter/MutualOMA)
> > > > |
> > > > | Subject: Re: Secure FTP using SSL
> > > > |
> > > >
> > > >
> >-------------------------------------------------------------
> > > > ---------------|
> > > >
> > > >
> > > >
> > > >
> > > >
> > > >
> > > > I think you have a few misconceptions.
> > > >
> > > > First, packets are sometimes "destroyed" or
> dropped in the
> > > > normal functioning of
> > > > any tcp/ip based network. That is why TCP
> numbers all of the
> > > > packets it sends
> > > > and automatically retransmits ones not acknowledged
> > > > (conceptually similar to EDI
> > > > 997s). FTP, adds another level of data
> corruption checking.
> > > >
> > > > Because information sent using standard FTP is
> not encrypted,
> > > > including your
> > > > user ID and password, it is possible for
> someone to see this
> > > > information if they
> > > > can gain access to a system along the actual
> path that your
> > > > data takes. (not
> > > > easy). Also, if they get your user ID and password they
> > can spoof a
> > > > transmission from you and send bogus data.
> > > >
> > > > SSL solves these problems using encryption
> algorithms RSA
> > > > public key encryption
> > > > for authentication and DES (or some other symmetric key
> > > > encryption algorithm) to
> > > > encrypt your data.
> > > >
> > > > The strength of these encryption mechanisms depends to a
> > > > large extent on key
> > > > length used. I believe, RSA encryption with a
> key of 1024
> > > > bits is currently
> > > > considered not crackable. Shorter key lengths may be
> > > > crackable but only with
> > > > great effort. A newer algorithm called
> elliptical curve can
> > > > also serve a
> > > > similar function but has not had time to be as
> well evaluated.
> > > >
> > > > DES usually uses 56 bit keys. This was considered
> > > > uncrackable up until a few
> > > > years ago. Now it can be cracked, but only with great
> > > > effort. Triple-DES is
> > > > being used as a replacement. (Triple DES has an
> effective key
> > > > length of 112.) I
> > > > believe it is currently not crackable. There are other
> > > > algorithms that can be
> > > > used instead of Triple-DES but, I believe,
> their security has
> > > > been less well
> > > > established.
> > > >
> > > > Of course the effectiveness of these algorithms can be
> > > > compromised if they are
> > > > not carefully implemented. (As has been recently
> > > > demonstrated by problems with
> > > > Internet Explorer, and Navigator.) But, even when the
> > > > implementation is less
> > > > than perfect and short keys are used these
> algorithms provide
> > > > a vastly more
> > > > secure mechanism for transporting files then plane FTP.
> > > >
> > > > I hope this helps some.
> > > >
> > > > Jay Rosansky
> > > > ACS-GSG
> > > >
> > > >
> > > >
> > > >
> > > >
> > >
> > >
> ==============================================================
> > > =========
> > > To signoff the EDI-L list,
> > mailto:[EMAIL PROTECTED]
> > > To subscribe,
> > mailto:[EMAIL PROTECTED]
> > To contact the list owner: mailto:[EMAIL PROTECTED]
> > Archives at
> http://www.mail-archive.com/edi-l%40listserv.ucop.edu/
> >
> >
> ==============================================================
> > =========
> > To signoff the EDI-L list,
> mailto:[EMAIL PROTECTED]
> > To subscribe,
> > mailto:[EMAIL PROTECTED]
> > To contact the list owner: mailto:[EMAIL PROTECTED]
> > Archives at
> http://www.mail-archive.com/edi-l%40listserv.ucop.edu/
> >
> >
>
>
> ==============================================================
> =========
> To signoff the EDI-L list,
> mailto:[EMAIL PROTECTED]
> To subscribe,
> mailto:[EMAIL PROTECTED]
> To contact the list owner: mailto:[EMAIL PROTECTED]
> Archives at
http://www.mail-archive.com/edi-l%40listserv.ucop.edu/
=======================================================================
To signoff the EDI-L list, mailto:[EMAIL PROTECTED]
To subscribe, mailto:[EMAIL PROTECTED]
To contact the list owner: mailto:[EMAIL PROTECTED]
Archives at http://www.mail-archive.com/edi-l%40listserv.ucop.edu/
=======================================================================
To signoff the EDI-L list, mailto:[EMAIL PROTECTED]
To subscribe, mailto:[EMAIL PROTECTED]
To contact the list owner: mailto:[EMAIL PROTECTED]
Archives at http://www.mail-archive.com/edi-l%40listserv.ucop.edu/