25.02.2013 Views

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

TCP/IP Tutorial and Technical Overview - IBM Redbooks

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

14.2.6 Security issues<br />

multicast option is described in RFC 2090. Figure 14-8 is an example of a TFTP<br />

read request packet modified to include the multicast option.<br />

Figure 14-8 The TFTP Multicast header<br />

If the server accepts the multicast, it sends an option acknowledgment (OACK)<br />

packet to the server including the multicast option. This packet consists of the<br />

multicast address <strong>and</strong> a flag that specifies whether the client should send<br />

acknowledgments (ACK).<br />

Because TFTP does not have any authentication mechanism, the server is<br />

responsible for protecting the host files. Generally, TFTP servers do not allow<br />

write access <strong>and</strong> only allow read access to public directories. Some server<br />

implementations also might employ host access lists to restrict access to only a<br />

subset of hosts.<br />

14.3 Secure Copy Protocol (SCP) <strong>and</strong> SSH FTP (SFTP)<br />

Secure Copy Protocol (SCP) <strong>and</strong> Secure Shell File Transfer Protocol (SFTP) are<br />

two methods of implementing secure transfer of files from one host to another.<br />

Neither protocol has been architected to perform authentication, <strong>and</strong> instead rely<br />

on the underlying SSH protocol on which they were built. This not only simplifies<br />

the implementation of the protocol, but avoids the pitfalls of traditional FTP (see<br />

14.1, “File Transfer Protocol (FTP)” on page 514) by encrypting all data that<br />

passes between the two hosts.<br />

Neither protocol is RFC architected, though an Internet draft currently exists for<br />

SFTP. Despite this lack of st<strong>and</strong>ardization, the protocol is implemented widely<br />

enough to be considered a de facto industry st<strong>and</strong>ard, <strong>and</strong> thus warrants<br />

discussion.<br />

14.3.1 SCP syntax <strong>and</strong> usage<br />

SCP functions much like the copy (cp) comm<strong>and</strong> on UNIX-based systems, <strong>and</strong><br />

takes the following format:<br />

scp flags sourceFile destinationFile<br />

Chapter 14. File-related protocols 533

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!