Differences

This shows you the differences between the selected revisions of the page.

ftps 2015-11-12 ftps 2024-09-18 (current)
Line 1: Line 1:
====== FTPS ====== ====== FTPS ======
-FTPS (also known as FTP Secure and %%FTP%%-%%SSL%%) is an extension to the commonly used File Transfer Protocol (%%FTP%%) that adds support for the [[tls|Transport Layer Security]] (TLS) and the Secure Sockets Layer (SSL) cryptographic protocols.·((&wikipedia_ref(FTPS|FTPS)))+FTPS (also known as FTP Secure and %%FTP%%-%%SSL%%) is an extension to the commonly used File Transfer Protocol (%%FTP%%) that adds support for the [[tls|Transport Layer Security]] (TLS) cryptographic protocol (previously known as the Secure Sockets Layer SSL).((&wikipedia_ref(FTPS|FTPS)))
===== [[methods]] Methods of Invoking ===== ===== [[methods]] Methods of Invoking =====
-Two separate methods were developed to invoke client security for use with %%FTP%% clients: //Explicit// or //Implicit//. The former method is a legacy compatible implementation where %%FTPS%% aware clients can invoke security with an FTPS aware server without breaking overall %%FTP%% functionality with non-%%FTPS%% aware clients. The later method is an incompatible method that requires clients to be %%FTPS%% aware. WinSCP supports both methods.+Two separate methods were developed to invoke client security for use with %%FTP%% clients: //Explicit// or //Implicit//. The former method is a legacy compatible implementation where %%FTPS%% aware clients can invoke security with an FTPS aware server without breaking overall %%FTP%% functionality with non-%%FTPS%% aware clients. The latter method is an incompatible method that requires clients to be %%FTPS%% aware. WinSCP supports both methods.
==== Explicit ==== ==== Explicit ====
Line 13: Line 13:
Negotiation is not allowed with implicit %%FTPS%% configurations. A client is immediately expected to challenge the %%FTPS%% server with a connection encrypted using TLS/SSL. If it does not, the server should drop the connection. Negotiation is not allowed with implicit %%FTPS%% configurations. A client is immediately expected to challenge the %%FTPS%% server with a connection encrypted using TLS/SSL. If it does not, the server should drop the connection.
-In order to maintain compatibility with existing non-%%TLS%%/%%SSL%% aware %%FTP%% clients, implicit %%FTPS%% was expected to listen on the IANA Well Known Port 990/TCP for the %%FTPS%% control channel and 989/%%TCP%% for the %%FTPS%% data channel. This allowed administrators to retain legacy compatible services on the original 21/%%TCP%% %%FTP%% control channel. dgdfg fdgdfgdfgdfgdfg+In order to maintain compatibility with existing non-%%TLS%%/%%SSL%% aware %%FTP%% clients, implicit %%FTPS%% was expected to listen on the IANA Well Known Port 990/TCP for the %%FTPS%% control channel and 989/%%TCP%% for the %%FTPS%% data channel. This allowed administrators to retain legacy compatible services on the original 21/%%TCP%% %%FTP%% control channel.
In Implicit Mode, the entire %%FTPS%% session (both control and data channels) is unconditionally encrypted. In Implicit Mode, the entire %%FTPS%% session (both control and data channels) is unconditionally encrypted.
===== [[certificate]] TLS/SSL Certificates ===== ===== [[certificate]] TLS/SSL Certificates =====
-Learn about [[tls#certificate|TLS/SSL certificates]].+Learn about TLS/SSL [[tls#certificate|server certificates]] and [[tls#client_certificate|client certificates]].

Last modified: by 217.37.32.29