[Info-vax] FTP/SSL from OpenVMS (client) to Unix Filezilla (server) failure

Dirk Munk munk at home.nl
Tue Aug 7 08:37:13 EDT 2012


gopalakrishnan wrote:
> Hi Ken
>
> I submitted a reply to Hoff's message and repeated when I did not find my reply here. And still it is not here (I did not get the usual response "message will be reviewd and posted" in those two instances). Hope this gets loaded.
>
> The server truly is FTP over SSL service (the very first line in the SP's documentation). They use "SFTP" to describe the service as being "secure". The service uses port 22 which is not FTP/SSL standard port but SFTP's. Even the server is named "sftp.xxxx.co.nz"
>
> Moreover I can connect to the sevice, view folders and download files using a Windows FilZilla client connecting to "FTPES://sftp.xxx.co.nz", port 22 (and user-id / password)
>
> I have tried SFTP and it does not work
>
> My infrastructure team is now investigating if this has anything to do with our firewall/isa configuration
>
> Regards -tk
>
>
> --http://compgroups.net/comp.os.vms/ftp-ssl-from-openvms-client-to-unix-filezilla-ser/1519815
>
>
With the windows version you are using explicit FTPS, or FTPES, and that 
may point to the problem. From Wikipedia:

Explicit

In explicit mode (also known as FTPES), an FTPS client must "explicitly 
request" security from an FTPS server and then step-up to a mutually 
agreed encryption method. If a client does not request security, the 
FTPS server can either allow the client to continue in unsecure mode or 
refuse/limit the connection.

The mechanism for negotiating authentication and security with FTP was 
added under RFC 2228, which included the new FTP command AUTH. While 
this RFC does not explicitly define any required security mechanisms, 
e.g. SSL or TLS, it does require the FTPS client to challenge the FTPS 
server with a mutually known mechanism. If the FTPS client challenges 
the FTPS server with an unknown security mechanism, the FTPS server will 
respond to the AUTH command with error code 504 (not supported). Clients 
may determine which mechanisms are supported by querying the FTPS server 
with the FEAT command, although servers are not necessarily required to 
be honest in disclosing what levels of security they support. Common 
methods of invoking FTPS security included AUTH TLS and AUTH SSL.

In the later RFC 4217, FTPS compliance required that clients always 
negotiate using the AUTH TLS method. The RFC also recommended FTPS 
servers to accept the draft mechanism AUTH TLS-C.


Th use of port 22 is wrong. For FTPS the normal port numbers are 989 and 
990. However some implications use the standard FTP port 21 for FTP and 
FTPS.

SFTP uses port 22, but as you know SFTP is something very different from 
FTP or FTPS.



More information about the Info-vax mailing list