Feeds

FTP celebrates ruby anniversary

Many happy RETRs

Combat fraud and increase customer satisfaction

File Transfer Protocol (FTP) marks its 40th anniversary on Saturday (April 16).

The venerable network protocol was first proposed by Abhay Bhushan of MIT in April 1971 as a means to transfer large files between disparate systems that made up ARPANet, the celebrated forerunner to the modern interweb.

The protocol required a minimum of handshaking, and even more crucially was tolerant of temporary interruptions during long file transfer sessions, making it far more suitable for the job than anything available at the time or HTTP, which came years later.

No traffic encryption - even for users names and passwords - was included at the that point so anyone could capture traffic on a network. Once the internet moved out of academia then more security was needed.

Initially random port numbers were assigned for every FTP session, in the belief that eavesdroppers would be highly unlikely to be listening in on a selected port at the time of a data exchange. It was soon realised that this was not enough, and industry standard encryption mechanisms such as SSL and later TSL were bundled with the protocol to wrap it in a secure overcoat from about 1996 onwards.

Frank Kenney, former Gartner practice analyst managed file transfer turned VP for Global Strategy at network security tools firm Ipswitch, said the lack of built-in security was more an issue for FTP in the US than in Europe in the 90s. That's because European firms used ISDN at the time which had built-in security of its own. It was only when everyone moved to high speed lines that everyone was stuck in the same boat.

Security problems were addressed by the use of either SSL or SSH (secure shell), but that still left the problems of scalability and manageability. These problems, along with guaranteed delivery, were addressed by the introduction of managed SSL, supported by FTP server packages from the likes of Ipswitch.

Early versions of FTP were command line based, restricting mainstream use of the technology until the advent of the first browsers around 1992. Prior to that users fiddled around with gopher clients, where users needed to know IP addresses and directory information in order to initiate file transfers.

Forty years on, and the protocol's next big step will be the delivery of managed file transfer via the clouds.

"The fundamentals of FTP are not going to change," Kenney said. "It will be enhanced using third party tools but there will be no re-write."

These days talk of file transfers, legal or otherwise, often leads onto a discussion about Torrents. Kenney is confident FTP will not be rendered obsolete by torrents. "Even movie pirates use FTP when they want to transfer files between systems," he said. ®

3 Big data security analytics techniques

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Kingston DataTraveler MicroDuo: Turn your phone into a 72GB beast
USB-usiness in the front, micro-USB party in the back
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
BOFH: Oh DO tell us what you think. *CLICK*
$%%&amp Oh dear, we've been cut *CLICK* Well hello *CLICK* You're breaking up...
AMD's 'Seattle' 64-bit ARM server chips now sampling, set to launch in late 2014
But they won't appear in SeaMicro Fabric Compute Systems anytime soon
Amazon reveals its Google-killing 'R3' server instances
A mega-memory instance that never forgets
Cisco reps flog Whiptail's Invicta arrays against EMC and Pure
Storage reseller report reveals who's selling what
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.