All I can tell you is I had for a while a ftp + ssl server running
(and yes ftp + ssl is useful in some scenarii) behind a pf machine and
it all worked perfectly well.

The problem is that you get first a SSL handshake and then all the
rest is ciphered, preveting ftp-proxy from doing its work.

You may need  to do the following:

- restrict the data ports of the ftp server to a certain range (for
example 40000 to 45000)
- open these ports on the pf machine (bypassing the ftp proxy behaviour)
- have the ftp server listen on a port other than 21

If you wanted ftp-proxy to work transparently with SSL it would have
to proxy the SSL handshake as well which might be a problem in terms
of security since the data flow would exist in clear (somewhere in
memory) on the proxy.

On 7/31/07, Peter N. M. Hansteen <[EMAIL PROTECTED]> wrote:
> A client of ours (don't ask) has been sold by somebody else on the
> idea that FTP over SSL (afaik implemented with some Microsoft system
> or other) is the way to go.
>
> Now FTP over SSL seems to be a variant which isn't obviously well
> supported other than a few experimental clients, and with a fairly
> straightforward 4.1 pf + ftp-proxy setup (close enough to the one in
> the tutorial[1]) near the client end, what I get is that the client
> and server happily clear authetication, but do not manage to set up
> their SSL connection.
>
> What I get from ftp-proxy is a sequence of
>
> Jul 31 10:49:27 delilah ftp-proxy[15797]: #1 client command too long or not 
> clean
>
> with incrementing # numbers, until the partners give up.
>
> The 'techies' at the other end seem to have problems with concepts
> such a server tunables, so the question is, is there some obvious
> ftp-proxy workaround I've missed (other than the even more obvious
> 'use something else')?
>
> - P
>
> [1] http://home.nuug.no/~/peter/pf/, specifically
>    http://home.nuug.no/~peter/pf/en/newftpproxy.html
>
> --
> Peter N. M. Hansteen, member of the first RFC 1149 implementation team
> http://www.blug.linux.no/rfc1149/ http://www.datadok.no/ http://www.nuug.no/
> "Remember to set the evil bit on all malicious network traffic"
> delilah spamd[29949]: 85.152.224.147: disconnected after 42673 seconds.

Reply via email to