[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: ops-operator-req-mgmt-01
Wed, Dec 26, 2001 at 11:22:12PM -0700, Steve Scheck:
> On Wed, 26 Dec 2001, Bill Woodcock wrote:
>
> > > i completely disagree with omission of FTP. ftp is an excellent method
> > > to upload router core dumps that exceed the size capabilities of tftp.
> > > just as it a good way to download images, while tftp is udp and i sure
> > > dont want scp logins from routers to my config servers. ftpd can be run
> > > anonymous only and can use tcp_wrapper like filtering features. ftp
> > > client should be a requirement.
> >
> > Why would you prefer unencrypted ftp logins to encrypted scp logins?
> >
> > Can you find a significant number of people who are in agreement with you
> > and are willing to tell me so?
> >
> > -Bill
>
> Gack, my apologies for the previous, incomplete response.
>
> In the event Mr. Heasley finds more in support of his position, here is
> one more in disagreement with him :)
>
> I completely disagree with including ftp client support as a requirement.
> FTP is a flawed, insecure protocol and its further acceptance should not
yes, it is insecure. but please tell me why it is flawed (ie: does not
work)? what about core dumps of cisco linecards (256M+) to an scp (ssh)
account without a password? no thanks.
> be validated by having it required in this or any future standards
> document. A reasonable compromise is to omit any language
> specifically requiring its omission (that would be my preference), thereby
> allowing vendors to include it if they see fit, but also requiring them
> to include SCP/SFTP or a reasonable alternative.
ditch tftp? not something i'd expect to be an omission by requirement;
its very simple to implement and thus can be in bootproms, etc. note
that tftp is very insecure. to not allow any of these is a step backward;
if you wish not to use ftp, tftp, or whatever that is fine, but dont
oppress others. the tool with the most "features" is not necessarily the
right tool.
> IMO, there is no reason why we can't settle on existing secure protocols,
> or if they are deemed insufficient, spawn a new working group and come up
> with something else. Can't we move beyond "almost secure" and choose
> something which we have no doubts about?
>
> -sjs
>
> --------------------------------------------------------------------------
> The opinions expressed are not necessarily congruent with those of my
> employer.
>