Firefox 88.0 and 78.10 ESR
Firefox 78.10 ESR contains
various fixes for stability, functionality, and security.
Posted Apr 19, 2021 18:01 UTC (Mon)
by Duncan (guest, #6647)
[Link] (21 responses)
"FTP support has been disabled, and its full removal is planned for an upcoming release. Addressing this security risk reduces the likelihood of an attack while also removing support for a non-encrypted protocol."
I'd have really expected that to make the chosen quote on a technically-oriented site such as LWN.
I realize and support the move to encrypted protocols in general, but is FTP really that far gone? In the interest of security I might have expected (and would definitely support), say, the same sort of "Insecure!" warning hoops they do for instance with my router's self-signed https cert, which is to say a somewhat higher level of pain than the simple "unencrypted" warning I get now with plain http sites, since I have the https-only option turned on (and was in fact defaulting to https via extension for a couple years before the functionality was built-in), but disabling FTP support by default in preparation for removal in I suppose a couple releases is still, IMO, arguably a bit strong.
Posted Apr 19, 2021 20:55 UTC (Mon)
by iabervon (subscriber, #722)
[Link] (7 responses)
Posted Apr 19, 2021 21:40 UTC (Mon)
by hummassa (subscriber, #307)
[Link] (5 responses)
Posted Apr 19, 2021 22:19 UTC (Mon)
by james (subscriber, #1325)
[Link] (4 responses)
On the other hand, FTPS (FTP over TLS) is a thing, but the browser probably isn't the best client for it. And SFTP (from the SSH suite) is normally a better choice.
Posted Apr 19, 2021 22:32 UTC (Mon)
by corbet (editor, #1)
[Link] (1 responses)
Posted Apr 20, 2021 4:17 UTC (Tue)
by rsidd (subscriber, #2582)
[Link]
Posted Apr 20, 2021 12:41 UTC (Tue)
by mbunkus (subscriber, #87248)
[Link] (1 responses)
As most of you know, FTP uses two TCP connections, one for the protocol itself and one for the data. Whenever a file is retrieved or sent the second connection is opened for that transfer. As most clients nowadays cannot be contacted by the server (which is what FTP's default "active" mode does), FTP clients connect to the server for the data connection, too (the "passive" mode, this is what all browsers implement).
The IP address[1] and port number to connect to are transmitted via the control channel. As the port numbers aren't fixed, any firewall or NAT device sitting in front of the server would have to parse the FTP control channel messages & temporarily open or forward ports for the connection to work.
Guess what doesn't work if the control channel is encrypted.
This means that either you'd have to open/forward quite a range of TCP ports on the FTP server's side (depending on how many concurrent transfers you wanted to support), or you simply couldn't run an FTPS server behind a NAT device. And all of that is a bitch to understand and debug even for experienced admins; now imagine how easy it was to support regular users with problems in their FTP transfer.
And the cherry on top? You could have fun configurations such as the control channel being encrypted but the data channel being cleartext, resulting in your password being protected but your "get credit_card_data.csv" being transmitted in the clear. Yay!
[1] You could initiate a three-way file transfer between two servers by connecting with a client to server A & B, then tell server A to listen & server B to connect to whatever port server A told you
Posted Apr 21, 2021 12:39 UTC (Wed)
by Lennie (subscriber, #49641)
[Link]
http://proftpd.org/docs/directives/linked/config_ref_Pass...
That way no firewall support needed to look into the control protocol.
Posted Apr 20, 2021 0:09 UTC (Tue)
by interalia (subscriber, #26615)
[Link]
Posted Apr 19, 2021 23:51 UTC (Mon)
by flussence (guest, #85566)
[Link] (3 responses)
Posted Apr 20, 2021 0:34 UTC (Tue)
by pabs (subscriber, #43278)
[Link] (2 responses)
Posted Apr 20, 2021 4:22 UTC (Tue)
by calumapplepie (guest, #143655)
[Link] (1 responses)
https://github.com/mozilla/standards-positions/issues/431
It's not really an upcoming feature, just a proposed spec. We'll see how it winds up.
Posted Apr 20, 2021 21:40 UTC (Tue)
by flussence (guest, #85566)
[Link]
Posted Apr 20, 2021 1:25 UTC (Tue)
by rra (subscriber, #99804)
[Link] (1 responses)
I'm not sure if it's worse than HTTP (it may be because of the PASV/PORT stuff, but it may not be), but unlike HTTP it's also become extremely rare, so it's easier to justify cutting off the attack surface.
Posted Apr 20, 2021 2:54 UTC (Tue)
by tialaramex (subscriber, #21167)
[Link]
If you actually have the FTP use case then HTTP is very obviously what you wanted since the 1990s. If you have a bunch of named files available, HTTP can serve them up. If now that you think about it, integrity, or confidentiality are worth something to you, then HTTPS is barely any extra effort on top of that.
Posted Apr 20, 2021 7:04 UTC (Tue)
by taladar (subscriber, #68407)
[Link]
* transmits passwords, commands and data in the clear
It is time to turn its undead shambling corpse and let it rest in peace.
Posted Apr 20, 2021 8:17 UTC (Tue)
by epa (subscriber, #39769)
[Link] (5 responses)
Posted Apr 20, 2021 9:11 UTC (Tue)
by joib (subscriber, #8541)
[Link] (2 responses)
So in practice it's as much of a defacto standard as HTTP servers autogenerating a directory listing. In practice this works well enough, e.g. lftp can provide a "ftp-like" command-line experience even though the underlying protocol is HTTP(S) rather than FTP. Try for instance "lftp http://kernel.org/pub"
Posted Apr 20, 2021 10:17 UTC (Tue)
by grawity (subscriber, #80596)
[Link]
The original
Posted Apr 20, 2021 14:13 UTC (Tue)
by rsidd (subscriber, #2582)
[Link]
Posted Apr 20, 2021 18:37 UTC (Tue)
by mss (subscriber, #138799)
[Link]
Posted Apr 20, 2021 21:58 UTC (Tue)
by flussence (guest, #85566)
[Link]
Removing FTP support too
Removing FTP support too
Removing FTP support too
If there is a password: there wouldn't be for anonymous FTP.
Removing FTP support too
Traditionally, in the Good Olde Days, anonymous FTP did indeed request a password; it was considered polite to provide your email address. But that was a different and rather more innocent time...
Removing FTP support too
Those days are still around if you use the command line, eg for UCSC genome data. (But FTP is deprecated. And, of course, there's no check on the email address.)
Removing FTP support too
$ ftp hgdownload.soe.ucsc.edu
Name: anonymous
Password: <your email address>
ftp> cd goldenPath
ftp> cd <assembly name> (e.g., hg19)
ftp> cd <data directory> (e.g., liftOver)
FTPS should die even quicker than FTP
FTPS should die even quicker than FTP
Removing FTP support too
Removing FTP support too
Removing FTP support too
Removing FTP support too
Removing FTP support too
Removing FTP support too
Removing FTP support too
Removing FTP support too
* is a pain to get through firewalls (pretty much requires a stateful firewall with connection tracking to work at all)
* is underspecified (e.g. format of ls output)
* does not support name-based virtual hosting
Removing FTP support too
Removing FTP support too
Removing FTP support too
LIST
indeed doesn't. Many FTP servers however now support MLSD
which is structured in a standard way.Removing FTP support too
Removing FTP support too
Removing FTP support too