31.07.2015 Views

network protocols handbook.pdf

network protocols handbook.pdf

network protocols handbook.pdf

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

19Protocols GuideTCP/IP - Application Layer ProtocolsProtocol NameFinger: User Information ProtocolProtocol DescriptionThe Finger user information protocol provides an interface to aremote user information program (RUIP). Finger, based on theTransmission Control Protocol, is a protocol for the exchangeof user information using TCP port 79. The local host opens aTCP connection to a remote host on the Finger port. An RUIPbecomes available on the remote end of the connection to processthe request. The local host sends the RUIP a one line querybased upon the Finger query specification and waits for theRUIP to respond. The RUIP receives and processes the query,returns an answer, then initiates the close of the connection.The local host receives the answer and the close signal andthen proceeds to close its end of the connection.Finger discloses information about users; moreover, such informationmay be considered sensitive. Security administratorsshould make explicit decisions about whether to run Finger andwhat information should be provided in responses. One existingimplementation provides the time the user last logged in, thetime he last read mail, whether unread mail was waiting for himand who the most recent unread mail was from! This makesit possible to track conversations in progress and see wheresomeone’s attention was focused. Sites that are information-securityconscious should not run Finger without an explicit understandingof how much information it is giving away.Implementations should be tested against various forms of attack.In particular, an RUIP SHOULD protect itself against malformedinputs. Vendors providing Finger with the operating systemor <strong>network</strong> software should subject their implementationsto penetration testing. Finger is one of the avenues for directpenetration. Like Telnet, FTP and SMTP, Finger is one of the<strong>protocols</strong> at the security perimeter of a host. Accordingly, thesoundness of the implementation is paramount. The implementationshould receive just as much security scrutiny during design,implementation, and testing as Telnet, FTP, or SMTP.Protocol StructureAny data transferred between two Finger hosts MUST be inASCII format, with no parity, and with lines ending in CRLF(ASCII 13 followed by ASCII 10). This excludes other characterformats such as EBCDIC, etc. This also means that any charactersbetween ASCII 128 and ASCII 255 should truly be internationaldata, not 7-bit ASCII with the parity bit set.The Finger query specification is defined:{Q1} ::= [{W}|{W}{S}{U}]{C}{Q2} ::= [{W}{S}][{U}]{H}{C}{U} ::= username{H} ::= @hostname | @hostname{H}{W} ::= /W{W} ::= /W{S} ::= | {S}{C} ::= Related <strong>protocols</strong>TCP, TELNET, SMTP, FTPSponsor SourceFinger is defined by IETF (http://www.ietf.org) in RFC 1288.Referencehttp://www.javvin.com/protocol/rfc1288.<strong>pdf</strong>FILE TRANSFER PROTOCOL (FTP)

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!