亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? all about ftp must read.txt

?? 1000 HOWTOs for various needs [WINDOWS]
?? TXT
?? 第 1 頁 / 共 2 頁
字號:

This may not be the definitive explanation, as the title claims, however, I've heard enough good feedback and seen this document linked in enough places to know that quite a few people have found it to be useful. I am always looking for ways to improve things though, and if you find something that is not quite clear or needs more explanation, please let me know! Recent additions to this document include the examples of both active and passive command line FTP sessions. These session examples should help make things a bit clearer. They also provide a nice picture into what goes on behind the scenes during an FTP session. Now, on to the information...



The Basics
FTP is a TCP based service exclusively. There is no UDP component to FTP. FTP is an unusual service in that it utilizes two ports, a 'data' port and a 'command' port (also known as the control port). Traditionally these are port 21 for the command port and port 20 for the data port. The confusion begins however, when we find that depending on the mode, the data port is not always on port 20.



Active FTP
In active mode FTP the client connects from a random unprivileged port (N > 1024) to the FTP server's command port, port 21. Then, the client starts listening to port N+1 and sends the FTP command PORT N+1 to the FTP server. The server will then connect back to the client's specified data port from its local data port, which is port 20.

From the server-side firewall's standpoint, to support active mode FTP the following communication channels need to be opened:

FTP server's port 21 from anywhere (Client initiates connection)
FTP server's port 21 to ports > 1024 (Server responds to client's control port)
FTP server's port 20 to ports > 1024 (Server initiates data connection to client's data port)
FTP server's port 20 from ports > 1024 (Client sends ACKs to server's data port)


In step 1, the client's command port contacts the server's command port and sends the command PORT 1027. The server then sends an ACK back to the client's command port in step 2. In step 3 the server initiates a connection on its local data port to the data port the client specified earlier. Finally, the client sends an ACK back as shown in step 4.

The main problem with active mode FTP actually falls on the client side. The FTP client doesn't make the actual connection to the data port of the server--it simply tells the server what port it is listening on and the server connects back to the specified port on the client. From the client side firewall this appears to be an outside system initiating a connection to an internal client--something that is usually blocked.



Active FTP Example
Below is an actual example of an active FTP session. The only things that have been changed are the server names, IP addresses, and user names. In this example an FTP session is initiated from testbox1.slacksite.com (192.168.150.80), a linux box running the standard FTP command line client, to testbox2.slacksite.com (192.168.150.90), a linux box running ProFTPd 1.2.2RC2. The debugging (-d) flag is used with the FTP client to show what is going on behind the scenes. Everything in red is the debugging output which shows the actual FTP commands being sent to the server and the responses generated from those commands. Normal server output is shown in black, and user input is in bold.

There are a few interesting things to consider about this dialog. Notice that when the PORT command is issued, it specifies a port on the client (192.168.150.80) system, rather than the server. We will see the opposite behavior when we use passive FTP. While we are on the subject, a quick note about the format of the PORT command. As you can see in the example below it is formatted as a series of six numbers separated by commas. The first four octets are the IP address while the second two octets comprise the port that will be used for the data connection. To find the actual port multiply the fifth octet by 256 and then add the sixth octet to the total. Thus in the example below the port number is ( (14*256) + 178), or 3762. A quick check with netstat should confirm this information.

testbox1: {/home/p-t/slacker/public_html} % ftp -d testbox2
Connected to testbox2.slacksite.com.
220 testbox2.slacksite.com FTP server ready.
Name (testbox2:slacker): slacker
---> USER slacker
331 Password required for slacker.
Password: TmpPass
---> PASS XXXX
230 User slacker logged in.
---> SYST
215 UNIX Type: L8
Remote system type is UNIX.
Using binary mode to transfer files.
ftp> ls
ftp: setsockopt (ignored): Permission denied
---> PORT 192,168,150,80,14,178
200 PORT command successful.
---> LIST
150 Opening ASCII mode data connection for file list.
drwx------ 3 slacker users 104 Jul 27 01:45 public_html
226 Transfer complete.
ftp> quit
---> QUIT
221 Goodbye.


Passive FTP
In order to resolve the issue of the server initiating the connection to the client a different method for FTP connections was developed. This was known as passive mode, or PASV, after the command used by the client to tell the server it is in passive mode.

In passive mode FTP the client initiates both connections to the server, solving the problem of firewalls filtering the incoming data port connection to the client from the server. When opening an FTP connection, the client opens two random unprivileged ports locally (N > 1024 and N+1). The first port contacts the server on port 21, but instead of then issuing a PORT command and allowing the server to connect back to its data port, the client will issue the PASV command. The result of this is that the server then opens a random unprivileged port (P > 1024) and sends the PORT P command back to the client. The client then initiates the connection from port N+1 to port P on the server to transfer data.

From the server-side firewall's standpoint, to support passive mode FTP the following communication channels need to be opened:

FTP server's port 21 from anywhere (Client initiates connection)
FTP server's port 21 to ports > 1024 (Server responds to client's control port)
FTP server's ports > 1024 from anywhere (Client initiates data connection to random port specified by server)
FTP server's ports > 1024 to remote ports > 1024 (Server sends ACKs (and data) to client's data port)



In step 1, the client contacts the server on the command port and issues the PASV command. The server then replies in step 2 with PORT 2024, telling the client which port it is listening to for the data connection. In step 3 the client then initiates the data connection from its data port to the specified server data port. Finally, the server sends back an ACK in step 4 to the client's data port.

While passive mode FTP solves many of the problems from the client side, it opens up a whole range of problems on the server side. The biggest issue is the need to allow any remote connection to high numbered ports on the server. Fortunately, many FTP daemons, including the popular WU-FTPD allow the administrator to specify a range of ports which the FTP server will use. See Appendix 1 for more information.

The second issue involves supporting and troubleshooting clients which do (or do not) support passive mode. As an example, the command line FTP utility provided with Solaris does not support passive mode, necessitating a third-party FTP client, such as ncftp.

With the massive popularity of the World Wide Web, many people prefer to use their web browser as an FTP client. Most browsers only support passive mode when accessing ftp:// URLs. This can either be good or bad depending on what the servers and firewalls are configured to support.



Passive FTP Example
Below is an actual example of a passive FTP session. The only things that have been changed are the server names, IP addresses, and user names. In this example an FTP session is initiated from testbox1.slacksite.com (192.168.150.80), a linux box running the standard FTP command line client, to testbox2.slacksite.com (192.168.150.90), a linux box running ProFTPd 1.2.2RC2. The debugging (-d) flag is used with the FTP client to show what is going on behind the scenes. Everything in red is the debugging output which shows the actual FTP commands being sent to the server and the responses generated from those commands. Normal server output is shown in black, and user input is in bold.

Notice the difference in the PORT command in this example as opposed to the active FTP example. Here, we see a port being opened on the server (192.168.150.90) system, rather than the client. See the discussion about the format of the PORT command above, in the Active FTP Example section.

testbox1: {/home/p-t/slacker/public_html} % ftp -d testbox2
Connected to testbox2.slacksite.com.
220 testbox2.slacksite.com FTP server ready.
Name (testbox2:slacker): slacker
---> USER slacker
331 Password required for slacker.
Password: TmpPass
---> PASS XXXX
230 User slacker logged in.
---> SYST
215 UNIX Type: L8
Remote system type is UNIX.
Using binary mode to transfer files.
ftp> passive
Passive mode on.
ftp> ls
ftp: setsockopt (ignored): Permission denied
---> PASV
227 Entering Passive Mode (192,168,150,90,195,149).
---> LIST
150 Opening ASCII mode data connection for file list
drwx------ 3 slacker users 104 Jul 27 01:45 public_html
226 Transfer complete.
ftp> quit
---> QUIT
221 Goodbye.


Summary
The following chart should help admins remember how each FTP mode works:

Active FTP :
command : client >1024 -> server 21
data : client >1024 <- server 20

Passive FTP :
command : client >1024 -> server 21
data : client >1024 -> server >1024

A quick summary of the pros and cons of active vs. passive FTP is also in order:

Active FTP is beneficial to the FTP server admin, but detrimental to the client side admin. The FTP server attempts to make connections to random high ports on the client, which would almost certainly be blocked by a firewall on the client side. Passive FTP is beneficial to the client, but detrimental to the FTP server admin. The client will make both connections to the server, but one of them will be to a random high port, which would almost certainly be blocked by a firewall on the server side.

Luckily, there is somewhat of a compromise. Since admins running FTP servers will need to make their servers accessible to the greatest number of clients, they will almost certainly need to support passive FTP. The exposure of high level ports on the server can be minimized by specifying a limited port range for the FTP server to use. Thus, everything except for this range of ports can be firewalled on the server side. While this doesn't eliminate all risk to the server, it decreases it tremendously.

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
91国偷自产一区二区三区成为亚洲经典 | 久久99热这里只有精品| 蜜乳av一区二区三区| 粉嫩av一区二区三区| 欧美高清激情brazzers| 欧美国产激情一区二区三区蜜月| 天天综合天天做天天综合| 国产精品99久久久久久久女警| 91麻豆自制传媒国产之光| 欧美一区二区播放| 综合久久综合久久| 国产自产2019最新不卡| 欧美性受xxxx| 亚洲欧洲无码一区二区三区| 全部av―极品视觉盛宴亚洲| 91浏览器打开| 中文字幕乱码日本亚洲一区二区| 欧美a一区二区| 欧美私人免费视频| 天天亚洲美女在线视频| 国产成人亚洲综合a∨婷婷图片| 欧美三级在线看| 亚洲欧美综合网| 国产制服丝袜一区| 欧美一区二区日韩| 婷婷中文字幕一区三区| 91国偷自产一区二区使用方法| 1区2区3区精品视频| 国产suv精品一区二区三区| 日韩免费高清视频| 精品在线亚洲视频| 欧美一区二区不卡视频| 婷婷亚洲久悠悠色悠在线播放| 欧美日韩一二区| 亚洲动漫第一页| 欧美色图片你懂的| 亚洲va国产天堂va久久en| 欧美丝袜自拍制服另类| 午夜婷婷国产麻豆精品| 在线视频你懂得一区| 一区二区高清在线| 日本高清成人免费播放| 亚洲精品水蜜桃| 欧美伊人久久大香线蕉综合69 | 日韩情涩欧美日韩视频| 日韩和欧美一区二区| 在线不卡免费欧美| 日本欧美久久久久免费播放网| 欧美精品在线一区二区三区| 日韩中文字幕麻豆| 欧美一区二区在线不卡| 久久99精品久久久久久久久久久久| 日韩免费观看2025年上映的电影| 国产在线播放一区三区四| 欧美精品一区二区三区久久久| 国产成人综合亚洲网站| 中国av一区二区三区| 91在线视频网址| 五月天精品一区二区三区| 精品99一区二区三区| 成人黄色在线网站| 一区二区三区在线播| 91精品久久久久久久99蜜桃| 韩国三级中文字幕hd久久精品| 中文字幕一区二区三区蜜月| 欧美视频你懂的| 国产美女精品人人做人人爽 | 久久中文字幕电影| 国产不卡在线一区| 亚洲影视在线播放| 日韩久久免费av| 91在线看国产| 老司机一区二区| 国产精品久久久一本精品| 欧美在线观看18| 国产毛片精品视频| 亚洲一二三区不卡| 欧美经典一区二区| 欧美日韩三级一区| 成人白浆超碰人人人人| 亚洲成av人综合在线观看| 欧美白人最猛性xxxxx69交| 日本精品视频一区二区三区| 国产精品一区2区| 日本在线不卡视频| 亚洲欧美自拍偷拍| 欧美精品一区在线观看| 欧美伊人精品成人久久综合97 | 欧美精品一区二区三区蜜臀| 99久久99久久综合| 久草中文综合在线| 午夜亚洲国产au精品一区二区| 中文字幕免费不卡在线| 91精品国产综合久久福利| 91欧美激情一区二区三区成人| 国产高清一区日本| 免费在线欧美视频| 午夜视频一区二区| 亚洲欧美成人一区二区三区| 久久精品亚洲精品国产欧美kt∨| 56国语精品自产拍在线观看| 色素色在线综合| 91在线视频18| 99re8在线精品视频免费播放| 国产专区欧美精品| 国产又粗又猛又爽又黄91精品| 日韩不卡一二三区| 亚洲高清免费一级二级三级| 亚洲精品视频自拍| 亚洲视频你懂的| 亚洲男同性视频| 亚洲色图在线看| 136国产福利精品导航| 中文字幕av一区二区三区| 久久久综合视频| 日本一区二区三级电影在线观看 | 久久久一区二区三区捆绑**| 日韩女优制服丝袜电影| 日韩亚洲欧美综合| 精品成人私密视频| 久久亚洲私人国产精品va媚药| 精品国产露脸精彩对白| 久久综合给合久久狠狠狠97色69| 欧美成人猛片aaaaaaa| 欧美大胆一级视频| 日韩视频一区二区三区| 欧美大片一区二区三区| 日韩午夜在线影院| 精品久久久久久久久久久久包黑料| 精品福利av导航| 国产视频一区在线播放| 国产欧美精品一区二区色综合朱莉| 精品sm在线观看| 国产精品黄色在线观看| 一区二区三区在线观看视频| 亚洲国产欧美另类丝袜| 捆绑紧缚一区二区三区视频| 国产a精品视频| 色久综合一二码| 欧美一区2区视频在线观看| 久久毛片高清国产| 亚洲人成网站在线| 日韩中文字幕区一区有砖一区| 激情亚洲综合在线| 91麻豆6部合集magnet| 91精品国模一区二区三区| 久久久久国色av免费看影院| 国产精品久久久久久一区二区三区 | 色综合久久久久久久久| 欧美日韩亚洲国产综合| 久久综合色一综合色88| 中文字幕在线免费不卡| 婷婷久久综合九色综合伊人色| 久久精品国产澳门| 97精品超碰一区二区三区| 这里只有精品免费| 亚洲视频资源在线| 精品制服美女丁香| 在线观看免费视频综合| 国产视频一区二区在线观看| 亚洲成a天堂v人片| 国产盗摄女厕一区二区三区| 欧美三级三级三级| 国产精品久久久久9999吃药| 秋霞电影一区二区| 99久久综合精品| 欧美成人乱码一区二区三区| 亚洲精品久久7777| 成人毛片老司机大片| 欧美麻豆精品久久久久久| 国产精品视频线看| 麻豆极品一区二区三区| 日本大香伊一区二区三区| 国产日产欧美一区二区三区| 五月天国产精品| 在线欧美小视频| 国产喂奶挤奶一区二区三区| 青娱乐精品视频在线| 欧美日韩免费一区二区三区| 国产精品无码永久免费888| 精品一区二区免费视频| 欧美伦理电影网| 一区二区三区欧美亚洲| 成人黄色免费短视频| 久久久国际精品| 寂寞少妇一区二区三区| 欧美一级一区二区| 亚洲成a人v欧美综合天堂下载 | 东方aⅴ免费观看久久av| 欧美不卡视频一区| 蜜桃久久精品一区二区| 91麻豆精品国产91久久久久久久久 | 日本一区二区免费在线观看视频| 理论片日本一区| 日韩精品一区二区在线| 五月天丁香久久| 欧美日韩在线三区| 亚洲成人免费av| 欧美精品1区2区3区| 亚洲二区在线视频|