Sponsored Content
Full Discussion: Secure ftp using ssl/tls
Top Forums UNIX for Dummies Questions & Answers Secure ftp using ssl/tls Post 84769 by Perderabo on Wednesday 28th of September 2005 01:25:37 PM
Old 09-28-2005
I do not use AIX nor ftps but I can make a few comments. A particular ftp program might have options for running over ssl. But you can not take just any ftp program and set a configuration option to transform it into an ftps program. It is possible that your AIX system has ftps capable ftp programs, but I would be a bit surprised if it does. You probably will need to get some software. You did not even reveal if you need client or server or both. Figure that out before you go looking for software.

ftps is still rather new and in its formative stages. Consequently there are various flavors of ftps. See implicit ssl vs explicit ssl.

I have never used ftps, but on paper it looks really great! But that is how I feel about the Itanium chip too. Smilie It is interesting that your mainframe is using ftps already. What does it connect to?
 

8 More Discussions You Might Find Interesting

1. Cybersecurity

TLS/SSL vulnerability explained

Here's a pretty good, and even PHB-compatible, explanation of the current TLS/SSl protocol vulnerability, including samples. (0 Replies)
Discussion started by: pludi
0 Replies

2. UNIX for Dummies Questions & Answers

TLS/SSL Openldap Centos 5.5

hi guys I configured my openldap but now I want to implement SSL-TLS This is my basic slapd.conf configuration include /etc/openldap/schema/core.schema include /etc/openldap/schema/cosine.schema include /etc/openldap/schema/inetorgperson.schema include ... (2 Replies)
Discussion started by: karlochacon
2 Replies

3. Linux

SSL/TLS uses the public key to encrypt data ?

Hi, I have a doubt..whether the SSL/TLS protocol uses the public key of the web server to encrypt data before sending it. I knew the browser verifies the public key of the web server using the digital certificate (by verifying the signature of the certificate using trusted authority). whether... (2 Replies)
Discussion started by: chaitus.28
2 Replies

4. Red Hat

HOW TO DISABLE SSL/TLS RENEGOTIATION?

Hi guys, Those who work on Apache may help me on this. I have following problem Description: The remote service encrypts traffic using TLS / SSL and permits clients to renegotiate connections. The computational requirements for renegotiating a connection are asymmetrical between the... (3 Replies)
Discussion started by: manalisharmabe
3 Replies

5. UNIX for Advanced & Expert Users

ldap over tls -- ssl cert help

Hey Guys, I am trying to setup ldap over tls in our lab. I am generating a self signed cert on the ldap server and importing that into the ldap system so it will use ldap over port 636. The clients will be a mix of solaris and redhat. I am lost on what I need to do on the client side to get... (0 Replies)
Discussion started by: s ladd
0 Replies

6. Shell Programming and Scripting

SSH shell script to access FTP over explicit TLS/SSL

Hello, I use the following SSH script to upload *.jpg files via FTP: #!/usr/bin/expect set timeout -1 spawn ftp -v -i expect "" send "\r" expect "Password:" send "\r" expect "ftp>" send "mput *.jpg\r" expect "ftp>" send "quit\r" replaced with actual ftp server/account data. ... (5 Replies)
Discussion started by: mrpi007
5 Replies

7. UNIX for Advanced & Expert Users

SSL/TLS with openldap

Hello to all, I'm beguinner in Linux instalations and I'm trying to Communicate from Web Sites that i have running under apache with openLDAP for users authentication using SSL mediation that seems to be connected with LDAPS. Can someone advise me how to do this, I have already installed... (1 Reply)
Discussion started by: CPMarco
1 Replies

8. AIX

AIX LDAP client authenticate against Linux Openldap server over TLS/SSL

Hi folks, How can i configure an AIX LDAP client to authenticate against an Linux Openldap server over TLS/SSL? It works like a charm without TLS/SSL. i would like to have SSL encrypted communication for ldap (secldapclntd) and ldapsearch etc. while accepting every kind of certificate/CA.... (6 Replies)
Discussion started by: paco699
6 Replies
SSL-CONTEXT-OPTIONS(3)							 1						    SSL-CONTEXT-OPTIONS(3)

SSL context options - SSL context option listing

	Context options for ssl:// and tls:// transports.

	      o $peer_name
		string	-  Peer  name  to  be used. If this value is not set, then the name is guessed based on the hostname used when opening the
		stream.

	      o $verify_peer
		boolean - Require verification of SSL certificate used.  Defaults to TRUE.

	      o $verify_peer_name
		boolean - Require verification of peer name.  Defaults to TRUE.

	      o $allow_self_signed
		boolean - Allow self-signed certificates. Requires $verify_peer.  Defaults to FALSE

	      o $cafile
		string - Location of Certificate Authority file on local filesystem which should be used with the verify_peer  context	option	to
		authenticate the identity of the remote peer.

	      o $capath
		string - If cafile is not specified or if the certificate is not found there, the directory pointed to by capath is searched for a
		suitable certificate.  capath must be a correctly hashed certificate directory.

	      o $local_cert
		string - Path to local certificate file on filesystem. It must be a PEM encoded file which contains your certificate  and  private
		key. It can optionally contain the certificate chain of issuers.

	      o $passphrase
		string - Passphrase with which your local_cert file was encoded.

	      o $CN_match
		string	-  Common  Name  we are expecting. PHP will perform limited wildcard matching. If the Common Name does not match this, the
		connection attempt will fail.

	      Note

		      This option is deprecated, in favour of $peer_name, as of PHP 5.6.0.

	      o $verify_depth
		integer - Abort if the certificate chain is too deep.  Defaults to no verification.

	      o $ciphers
		string - Sets the list of available ciphers. The format of the string is described in ciphers(1).  Defaults to DEFAULT.

	      o $capture_peer_cert
		boolean - If set to TRUE a peer_certificate context option will be created containing the peer certificate.

	      o $capture_peer_cert_chain
		boolean - If set to TRUE a peer_certificate_chain context option will be created containing the certificate chain.

	      o $SNI_enabled
		boolean - If set to TRUE server name indication will be enabled. Enabling SNI allows multiple certificates on the same IP address.

	      o $SNI_server_name
		string - If set, then this value will be used as server name for server name indication. If this value is not set, then the server
		name is guessed based on the hostname used when opening the stream.

	      Note

		      This option is deprecated, in favour of $peer_name, as of PHP 5.6.0.

	      o $disable_compression
		boolean - If set, disable TLS compression. This can help mitigate the CRIME attack vector.

	      o $peer_fingerprint
		string	|  array  - Aborts when the remote certificate digest doesn't match the specified hash.  When a string is used, the length
		will determine which hashing algorithm is applied, either "md5" (32) or "sha1" (40).  When an array is used, the keys indicate the
		hashing algorithm name and each corresponding value is the expected digest.

       +--------+---------------------------------------------------+
       |Version |						    |
       |	|						    |
       |	|		     Description		    |
       |	|						    |
       +--------+---------------------------------------------------+
       | 5.6.0	|						    |
       |	|						    |
       |	|  Added  $peer_fingerprint  and $verify_peer_name. |
       |	| $verify_peer default changed to TRUE. 	    |
       |	|						    |
       |5.4.13	|						    |
       |	|						    |
       |	|  Added $disable_compression. Requires OpenSSL  >= |
       |	| 1.0.0.					    |
       |	|						    |
       | 5.3.2	|						    |
       |	|						    |
       |	|      Added $SNI_enabled and $SNI_server_name.     |
       |	|						    |
       | 5.0.0	|						    |
       |	|						    |
       |	|  Added   $capture_peer_cert,	$capture_peer_chain |
       |	| and $ciphers. 				    |
       |	|						    |
       +--------+---------------------------------------------------+
       Note

	       Because ssl:// is the underlying transport for the https:// and ftps:// wrappers, any context options which apply  to  ssl://  also
	      apply to https:// and ftps://.

       Note

	       For  SNI  (Server  Name	Indication)  to  be  available,  then  PHP  must  be  compiled	with  OpenSSL  0.9.8j  or greater. Use the
	      OPENSSL_TLSEXT_SERVER_NAME to determine whether SNI is supported.

       "Socket context options".

PHP Documentation Group 												    SSL-CONTEXT-OPTIONS(3)
All times are GMT -4. The time now is 09:45 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy