亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? all about ftp must read.txt

?? a collection of mega hacking tools
?? TXT
?? 第 1 頁 / 共 2 頁
字號:

This may not be the definitive explanation, as the title claims, however, I've heard enough good feedback and seen this document linked in enough places to know that quite a few people have found it to be useful. I am always looking for ways to improve things though, and if you find something that is not quite clear or needs more explanation, please let me know! Recent additions to this document include the examples of both active and passive command line FTP sessions. These session examples should help make things a bit clearer. They also provide a nice picture into what goes on behind the scenes during an FTP session. Now, on to the information...



The Basics
FTP is a TCP based service exclusively. There is no UDP component to FTP. FTP is an unusual service in that it utilizes two ports, a 'data' port and a 'command' port (also known as the control port). Traditionally these are port 21 for the command port and port 20 for the data port. The confusion begins however, when we find that depending on the mode, the data port is not always on port 20.



Active FTP
In active mode FTP the client connects from a random unprivileged port (N > 1024) to the FTP server's command port, port 21. Then, the client starts listening to port N+1 and sends the FTP command PORT N+1 to the FTP server. The server will then connect back to the client's specified data port from its local data port, which is port 20.

From the server-side firewall's standpoint, to support active mode FTP the following communication channels need to be opened:

FTP server's port 21 from anywhere (Client initiates connection)
FTP server's port 21 to ports > 1024 (Server responds to client's control port)
FTP server's port 20 to ports > 1024 (Server initiates data connection to client's data port)
FTP server's port 20 from ports > 1024 (Client sends ACKs to server's data port)


In step 1, the client's command port contacts the server's command port and sends the command PORT 1027. The server then sends an ACK back to the client's command port in step 2. In step 3 the server initiates a connection on its local data port to the data port the client specified earlier. Finally, the client sends an ACK back as shown in step 4.

The main problem with active mode FTP actually falls on the client side. The FTP client doesn't make the actual connection to the data port of the server--it simply tells the server what port it is listening on and the server connects back to the specified port on the client. From the client side firewall this appears to be an outside system initiating a connection to an internal client--something that is usually blocked.



Active FTP Example
Below is an actual example of an active FTP session. The only things that have been changed are the server names, IP addresses, and user names. In this example an FTP session is initiated from testbox1.slacksite.com (192.168.150.80), a linux box running the standard FTP command line client, to testbox2.slacksite.com (192.168.150.90), a linux box running ProFTPd 1.2.2RC2. The debugging (-d) flag is used with the FTP client to show what is going on behind the scenes. Everything in red is the debugging output which shows the actual FTP commands being sent to the server and the responses generated from those commands. Normal server output is shown in black, and user input is in bold.

There are a few interesting things to consider about this dialog. Notice that when the PORT command is issued, it specifies a port on the client (192.168.150.80) system, rather than the server. We will see the opposite behavior when we use passive FTP. While we are on the subject, a quick note about the format of the PORT command. As you can see in the example below it is formatted as a series of six numbers separated by commas. The first four octets are the IP address while the second two octets comprise the port that will be used for the data connection. To find the actual port multiply the fifth octet by 256 and then add the sixth octet to the total. Thus in the example below the port number is ( (14*256) + 178), or 3762. A quick check with netstat should confirm this information.

testbox1: {/home/p-t/slacker/public_html} % ftp -d testbox2
Connected to testbox2.slacksite.com.
220 testbox2.slacksite.com FTP server ready.
Name (testbox2:slacker): slacker
---> USER slacker
331 Password required for slacker.
Password: TmpPass
---> PASS XXXX
230 User slacker logged in.
---> SYST
215 UNIX Type: L8
Remote system type is UNIX.
Using binary mode to transfer files.
ftp> ls
ftp: setsockopt (ignored): Permission denied
---> PORT 192,168,150,80,14,178
200 PORT command successful.
---> LIST
150 Opening ASCII mode data connection for file list.
drwx------ 3 slacker users 104 Jul 27 01:45 public_html
226 Transfer complete.
ftp> quit
---> QUIT
221 Goodbye.


Passive FTP
In order to resolve the issue of the server initiating the connection to the client a different method for FTP connections was developed. This was known as passive mode, or PASV, after the command used by the client to tell the server it is in passive mode.

In passive mode FTP the client initiates both connections to the server, solving the problem of firewalls filtering the incoming data port connection to the client from the server. When opening an FTP connection, the client opens two random unprivileged ports locally (N > 1024 and N+1). The first port contacts the server on port 21, but instead of then issuing a PORT command and allowing the server to connect back to its data port, the client will issue the PASV command. The result of this is that the server then opens a random unprivileged port (P > 1024) and sends the PORT P command back to the client. The client then initiates the connection from port N+1 to port P on the server to transfer data.

From the server-side firewall's standpoint, to support passive mode FTP the following communication channels need to be opened:

FTP server's port 21 from anywhere (Client initiates connection)
FTP server's port 21 to ports > 1024 (Server responds to client's control port)
FTP server's ports > 1024 from anywhere (Client initiates data connection to random port specified by server)
FTP server's ports > 1024 to remote ports > 1024 (Server sends ACKs (and data) to client's data port)



In step 1, the client contacts the server on the command port and issues the PASV command. The server then replies in step 2 with PORT 2024, telling the client which port it is listening to for the data connection. In step 3 the client then initiates the data connection from its data port to the specified server data port. Finally, the server sends back an ACK in step 4 to the client's data port.

While passive mode FTP solves many of the problems from the client side, it opens up a whole range of problems on the server side. The biggest issue is the need to allow any remote connection to high numbered ports on the server. Fortunately, many FTP daemons, including the popular WU-FTPD allow the administrator to specify a range of ports which the FTP server will use. See Appendix 1 for more information.

The second issue involves supporting and troubleshooting clients which do (or do not) support passive mode. As an example, the command line FTP utility provided with Solaris does not support passive mode, necessitating a third-party FTP client, such as ncftp.

With the massive popularity of the World Wide Web, many people prefer to use their web browser as an FTP client. Most browsers only support passive mode when accessing ftp:// URLs. This can either be good or bad depending on what the servers and firewalls are configured to support.



Passive FTP Example
Below is an actual example of a passive FTP session. The only things that have been changed are the server names, IP addresses, and user names. In this example an FTP session is initiated from testbox1.slacksite.com (192.168.150.80), a linux box running the standard FTP command line client, to testbox2.slacksite.com (192.168.150.90), a linux box running ProFTPd 1.2.2RC2. The debugging (-d) flag is used with the FTP client to show what is going on behind the scenes. Everything in red is the debugging output which shows the actual FTP commands being sent to the server and the responses generated from those commands. Normal server output is shown in black, and user input is in bold.

Notice the difference in the PORT command in this example as opposed to the active FTP example. Here, we see a port being opened on the server (192.168.150.90) system, rather than the client. See the discussion about the format of the PORT command above, in the Active FTP Example section.

testbox1: {/home/p-t/slacker/public_html} % ftp -d testbox2
Connected to testbox2.slacksite.com.
220 testbox2.slacksite.com FTP server ready.
Name (testbox2:slacker): slacker
---> USER slacker
331 Password required for slacker.
Password: TmpPass
---> PASS XXXX
230 User slacker logged in.
---> SYST
215 UNIX Type: L8
Remote system type is UNIX.
Using binary mode to transfer files.
ftp> passive
Passive mode on.
ftp> ls
ftp: setsockopt (ignored): Permission denied
---> PASV
227 Entering Passive Mode (192,168,150,90,195,149).
---> LIST
150 Opening ASCII mode data connection for file list
drwx------ 3 slacker users 104 Jul 27 01:45 public_html
226 Transfer complete.
ftp> quit
---> QUIT
221 Goodbye.


Summary
The following chart should help admins remember how each FTP mode works:

Active FTP :
command : client >1024 -> server 21
data : client >1024 <- server 20

Passive FTP :
command : client >1024 -> server 21
data : client >1024 -> server >1024

A quick summary of the pros and cons of active vs. passive FTP is also in order:

Active FTP is beneficial to the FTP server admin, but detrimental to the client side admin. The FTP server attempts to make connections to random high ports on the client, which would almost certainly be blocked by a firewall on the client side. Passive FTP is beneficial to the client, but detrimental to the FTP server admin. The client will make both connections to the server, but one of them will be to a random high port, which would almost certainly be blocked by a firewall on the server side.

Luckily, there is somewhat of a compromise. Since admins running FTP servers will need to make their servers accessible to the greatest number of clients, they will almost certainly need to support passive FTP. The exposure of high level ports on the server can be minimized by specifying a limited port range for the FTP server to use. Thus, everything except for this range of ports can be firewalled on the server side. While this doesn't eliminate all risk to the server, it decreases it tremendously.

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
久久九九99视频| 久久99深爱久久99精品| 麻豆精品在线看| 成人国产精品免费观看| 91精品国产一区二区三区| 日韩毛片一二三区| 韩国欧美国产1区| 欧美日本一区二区在线观看| 国产精品久久久久久久久搜平片 | 色综合久久综合网97色综合| 精品噜噜噜噜久久久久久久久试看 | 一区二区三区四区精品在线视频| 六月婷婷色综合| 欧美日韩国产欧美日美国产精品| 国产精品久久久久aaaa| 久草热8精品视频在线观看| 欧美喷潮久久久xxxxx| 中文字幕免费观看一区| 国内欧美视频一区二区 | 久久久久青草大香线综合精品| 石原莉奈一区二区三区在线观看| 色综合激情五月| 综合久久久久久久| 丰满白嫩尤物一区二区| 久久婷婷久久一区二区三区| 奇米影视一区二区三区| 欧美丰满嫩嫩电影| 亚洲成av人片在线观看无码| 在线亚洲高清视频| 一区二区三区精品在线| 色综合一个色综合| 日韩1区2区3区| 欧美性一二三区| 亚洲一区在线播放| 欧美视频中文字幕| 亚洲午夜视频在线观看| 欧美视频中文字幕| 日韩电影一区二区三区四区| 欧美三级资源在线| 天堂在线亚洲视频| 欧美一卡2卡3卡4卡| 麻豆91在线观看| 久久婷婷久久一区二区三区| 国产高清亚洲一区| 国产精品色婷婷| 一本一本大道香蕉久在线精品| 夜夜爽夜夜爽精品视频| 欧美日韩和欧美的一区二区| 日本不卡一二三| 精品国产a毛片| av电影在线观看一区| 亚洲男人电影天堂| 欧美裸体bbwbbwbbw| 久草中文综合在线| 国产精品狼人久久影院观看方式| 在线免费亚洲电影| 偷窥少妇高潮呻吟av久久免费| 精品欧美一区二区三区精品久久| 国产精品系列在线观看| 国产精品麻豆久久久| 欧美午夜电影网| 国产一区二三区好的| 中文字幕永久在线不卡| 欧美久久一区二区| 国产一区二区美女| 中文字幕字幕中文在线中不卡视频| 欧美日韩一区久久| 国内精品国产成人国产三级粉色| 综合自拍亚洲综合图不卡区| 7777女厕盗摄久久久| 国产成人精品一区二区三区网站观看| 一区二区三区成人| 精品捆绑美女sm三区| 色国产精品一区在线观看| 麻豆一区二区三区| 亚洲丝袜制服诱惑| www久久精品| 欧美三级电影在线看| 国产一区二区三区| 亚洲一区二区av在线| 国产日韩精品视频一区| 51久久夜色精品国产麻豆| thepron国产精品| 久久国产综合精品| 一区二区三区在线免费观看 | 欧美日本韩国一区| 国产不卡免费视频| 毛片av一区二区| 亚洲成av人影院| 亚洲欧美偷拍另类a∨色屁股| 久久久三级国产网站| 欧美日韩精品免费| 91无套直看片红桃| 国产91精品免费| 加勒比av一区二区| 日韩中文字幕区一区有砖一区| 国产精品护士白丝一区av| 26uuu精品一区二区| 日韩一区二区三区三四区视频在线观看| 色8久久精品久久久久久蜜| 国产成a人亚洲精| 国产精品一品二品| 久久99国产精品免费网站| 天天做天天摸天天爽国产一区| 亚洲日本一区二区| 国产农村妇女精品| 久久色在线视频| 精品第一国产综合精品aⅴ| 91精品国产综合久久婷婷香蕉 | 久久久精品tv| 精品久久人人做人人爱| 555夜色666亚洲国产免| 欧美三电影在线| 欧美精品久久99| 欧美一区二区网站| 欧美日韩国产成人在线91| 欧美日韩精品欧美日韩精品一 | 中文幕一区二区三区久久蜜桃| 久久亚洲影视婷婷| 久久一区二区三区四区| 26uuu精品一区二区三区四区在线| 欧美mv日韩mv亚洲| 久久婷婷国产综合国色天香| 国产性色一区二区| 国产欧美va欧美不卡在线| **性色生活片久久毛片| 国产精品久久久久久妇女6080 | 韩国av一区二区三区| 国内成+人亚洲+欧美+综合在线| 韩国av一区二区三区四区| 国产精品88av| 97精品视频在线观看自产线路二| 色婷婷综合激情| 制服丝袜日韩国产| 精品久久一区二区| 国产色爱av资源综合区| 亚洲人精品午夜| 青青草国产精品亚洲专区无| 精品一区二区三区蜜桃| 国产成人亚洲综合色影视| 成人小视频免费观看| 91国产丝袜在线播放| 欧美一级日韩不卡播放免费| 精品国产乱码久久久久久浪潮| 国产精品视频免费| 亚洲国产va精品久久久不卡综合| 久久精品噜噜噜成人av农村| 国产精品1区2区| 日本久久电影网| 精品国产免费视频| |精品福利一区二区三区| 日本成人在线看| av福利精品导航| 欧美成人一区二区三区片免费 | 亚洲成人动漫一区| 久久精品国产秦先生| 国产suv精品一区二区三区| 91国产免费观看| 国产无一区二区| 日韩福利视频网| 91猫先生在线| 久久天堂av综合合色蜜桃网| 亚洲国产欧美在线人成| 国产综合色在线视频区| 欧美视频一区在线| 欧美韩国日本综合| 美女网站在线免费欧美精品| 91色.com| 国产精品毛片大码女人| 美女在线一区二区| 欧美亚洲国产一区二区三区| 国产丝袜在线精品| 日韩av电影天堂| 色婷婷av一区二区三区gif| 久久久精品tv| 蜜桃av一区二区三区| 在线观看欧美黄色| 一区在线中文字幕| 国产精品一区三区| 91精品国产综合久久久久| 亚洲一区二区三区影院| www..com久久爱| 国产亚洲成年网址在线观看| 免费观看成人鲁鲁鲁鲁鲁视频| 91猫先生在线| 中文字幕一区二区三区在线不卡 | 国产综合久久久久影院| 欧美综合天天夜夜久久| 国产精品久久久久久亚洲伦 | 欧美精品一区二区三区久久久| 无码av中文一区二区三区桃花岛| 91黄色激情网站| 亚洲欧美另类综合偷拍| 91小视频免费看| 亚洲欧美视频在线观看视频| 99热在这里有精品免费| 国产精品网曝门| 成人av综合一区| 中文字幕一区二区三区色视频| 成人av在线播放网址|