Feeds

FTP celebrates ruby anniversary

Many happy RETRs

Build a business case: developing custom apps

File Transfer Protocol (FTP) marks its 40th anniversary on Saturday (April 16).

The venerable network protocol was first proposed by Abhay Bhushan of MIT in April 1971 as a means to transfer large files between disparate systems that made up ARPANet, the celebrated forerunner to the modern interweb.

The protocol required a minimum of handshaking, and even more crucially was tolerant of temporary interruptions during long file transfer sessions, making it far more suitable for the job than anything available at the time or HTTP, which came years later.

No traffic encryption - even for users names and passwords - was included at the that point so anyone could capture traffic on a network. Once the internet moved out of academia then more security was needed.

Initially random port numbers were assigned for every FTP session, in the belief that eavesdroppers would be highly unlikely to be listening in on a selected port at the time of a data exchange. It was soon realised that this was not enough, and industry standard encryption mechanisms such as SSL and later TSL were bundled with the protocol to wrap it in a secure overcoat from about 1996 onwards.

Frank Kenney, former Gartner practice analyst managed file transfer turned VP for Global Strategy at network security tools firm Ipswitch, said the lack of built-in security was more an issue for FTP in the US than in Europe in the 90s. That's because European firms used ISDN at the time which had built-in security of its own. It was only when everyone moved to high speed lines that everyone was stuck in the same boat.

Security problems were addressed by the use of either SSL or SSH (secure shell), but that still left the problems of scalability and manageability. These problems, along with guaranteed delivery, were addressed by the introduction of managed SSL, supported by FTP server packages from the likes of Ipswitch.

Early versions of FTP were command line based, restricting mainstream use of the technology until the advent of the first browsers around 1992. Prior to that users fiddled around with gopher clients, where users needed to know IP addresses and directory information in order to initiate file transfers.

Forty years on, and the protocol's next big step will be the delivery of managed file transfer via the clouds.

"The fundamentals of FTP are not going to change," Kenney said. "It will be enhanced using third party tools but there will be no re-write."

These days talk of file transfers, legal or otherwise, often leads onto a discussion about Torrents. Kenney is confident FTP will not be rendered obsolete by torrents. "Even movie pirates use FTP when they want to transfer files between systems," he said. ®

Boost IT visibility and business value

More from The Register

next story
Sysadmin Day 2014: Quick, there's still time to get the beers in
He walked over the broken glass, killed the thugs... and er... reconnected the cables*
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
SHOCK and AWS: The fall of Amazon's deflationary cloud
Just as Jeff Bezos did to books and CDs, Amazon's rivals are now doing to it
VVOL update: Are any vendors NOT leaping into bed with VMware?
It's not yet been released but everyone thinks it's the dog's danglies
BlackBerry: Toss the server, mate... BES is in the CLOUD now
BlackBerry Enterprise Services takes aim at SMEs - but there's a catch
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.