Feeds

FTP celebrates ruby anniversary

Many happy RETRs

Gartner critical capabilities for enterprise endpoint backup

File Transfer Protocol (FTP) marks its 40th anniversary on Saturday (April 16).

The venerable network protocol was first proposed by Abhay Bhushan of MIT in April 1971 as a means to transfer large files between disparate systems that made up ARPANet, the celebrated forerunner to the modern interweb.

The protocol required a minimum of handshaking, and even more crucially was tolerant of temporary interruptions during long file transfer sessions, making it far more suitable for the job than anything available at the time or HTTP, which came years later.

No traffic encryption - even for users names and passwords - was included at the that point so anyone could capture traffic on a network. Once the internet moved out of academia then more security was needed.

Initially random port numbers were assigned for every FTP session, in the belief that eavesdroppers would be highly unlikely to be listening in on a selected port at the time of a data exchange. It was soon realised that this was not enough, and industry standard encryption mechanisms such as SSL and later TSL were bundled with the protocol to wrap it in a secure overcoat from about 1996 onwards.

Frank Kenney, former Gartner practice analyst managed file transfer turned VP for Global Strategy at network security tools firm Ipswitch, said the lack of built-in security was more an issue for FTP in the US than in Europe in the 90s. That's because European firms used ISDN at the time which had built-in security of its own. It was only when everyone moved to high speed lines that everyone was stuck in the same boat.

Security problems were addressed by the use of either SSL or SSH (secure shell), but that still left the problems of scalability and manageability. These problems, along with guaranteed delivery, were addressed by the introduction of managed SSL, supported by FTP server packages from the likes of Ipswitch.

Early versions of FTP were command line based, restricting mainstream use of the technology until the advent of the first browsers around 1992. Prior to that users fiddled around with gopher clients, where users needed to know IP addresses and directory information in order to initiate file transfers.

Forty years on, and the protocol's next big step will be the delivery of managed file transfer via the clouds.

"The fundamentals of FTP are not going to change," Kenney said. "It will be enhanced using third party tools but there will be no re-write."

These days talk of file transfers, legal or otherwise, often leads onto a discussion about Torrents. Kenney is confident FTP will not be rendered obsolete by torrents. "Even movie pirates use FTP when they want to transfer files between systems," he said. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
The Return of BSOD: Does ANYONE trust Microsoft patches?
Sysadmins, you're either fighting fires or seen as incompetents now
Microsoft: Azure isn't ready for biz-critical apps … yet
Microsoft will move its own IT to the cloud to avoid $200m server bill
Oracle reveals 32-core, 10 BEEELLION-transistor SPARC M7
New chip scales to 1024 cores, 8192 threads 64 TB RAM, at speeds over 3.6GHz
US regulators OK sale of IBM's x86 server biz to Lenovo
Now all that remains is for gov't offices to ban the boxes
Flash could be CHEAPER than SAS DISK? Come off it, NetApp
Stats analysis reckons we'll hit that point in just three years
Object storage bods Exablox: RAID is dead, baby. RAID is dead
Bring your own disks to its object appliances
Nimble's latest mutants GORGE themselves on unlucky forerunners
Crossing Sandy Bridges without stopping for breath
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 10 endpoint backup mistakes
Avoid the ten endpoint backup mistakes to ensure that your critical corporate data is protected and end user productivity is improved.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.