Securing FTP/iX

1
Table of Contents
1
Table of Contents
2
Revision History
3
Executive Summary
4
Introduction
5
FTP/iX Security Overview
6
FTP/iX Security Details
6.1
FTPUSERS.ARPA.SYS
6.1.1
Configuring FTPUSERS file
6.1.2
FTPUSERS configuration rules
6.1.3
Examples
6.2
FTPACCES.ARPA.SYS
6.2.1
Configuring the FTPACCES NORETRIEVEoption
6.2.2
Specific configuration rules for NORETRIEVE option
6.2.3
Examples for noretrieve option
6.2.4
Configuring the FTPACCES CHROOT option
6.2.5
Specific Configuration Rules for the CHROOT option
6.2.6
Examples for Chroot option
6.3
SETPARMS.ARPA.SYS
6.3.1
Configuring SETPARMS for file permission denial
6.3.2
Specific configuration rules for file permission denial
6.3.3
Examples for Permission denial
6.3.4
Configuring SETPARMS for Logging commands and transfers
6.3.5
Specific configuration rules for Log Commands and Log Transfers
6.3.6
Example
6.3.7
Configuring the SETPARMS DEBUG_PASS option
6.3.8
Example
6.4
Disallowing READ access to NETRC file
6.4.1
Rules of the NETRC configuration file
6.4.2
Example
6.5
Banner
6.5.1
Configuring FTPHELLO
6.5.2
Rules of FTPHELLO configuration file
6.5.3
Examples
7
Encryption Alternatives
7.1
A Script to transfer files (securely) using FTP/iX
7.1.1
Examples
7.2
Using Linux/HP-UX intermediaries
7.3
Sockisified FTP on MPE
7.4
OpenSSH on MPE
7.5
Hardware Solutions
7.5.1
Isolating MPE behind IPv6
7.5.2
HP procurve Network solutions
7.5.3
Encrypting router
8
Conclusion
Page
2
of
28
Secure FTP on MPE/iX
7/18/2008
http://jazz.external.hp.com/papers/Securing
-
-
Whitepaper.html