使用 ftp 或使用 telnet 将代码上传到开发或生产服务器,它们都不安全吗?
我仍然看到人们使用 ftp 或 telnet 来工作,而不是 sftp 和 ssh。 使用ftp或telnet真的可以很容易地让人们看到密码吗? 谁能真正看到它?
更新:例如,如果我不使用无线...我听说如果它是 WEP,当发送或接收 1GB 流量时可能会损坏...所以如果不使用无线,我使用 DSL、Comcast 等有线互联网或 AT&T 的 U-verse 光纤,那么谁可以阅读它? 我的邻居或附近公司或大学数据中心的乔可以阅读它吗? 或者乔在一家大型托管公司或数据中心工作,如果我从加利福尼亚州通过 ftp 传输到芝加哥,而该公司或数据中心恰好位于加利福尼亚州和芝加哥之间的某个地方?
更新 2: 所以最好使用 alias ftp='echo use sftp!!' 也在狂欢上
i still see people using ftp or telnet for work instead of sftp and ssh. is it true that using ftp or telnet can let people see the password quite easily? Who can actually see it?
Update: for example, if i am not using Wireless... which i heard can be breakable if it is WEP when 1GB traffic is sent or received ... so if not using Wireless, and I am using either DSL, Cable Internet like Comcast, or AT&T's U-verse's fiber optics, then who can read it? Can my neighbor, or joe at the data center at a nearby company or university read it? Or joe at a big hosting company or data center that happens to be some where between California and Chicago if I am ftp'ing from California to Chicago?
Update 2: so maybe it is good to alias ftp='echo use sftp!!' on the bash too
如果你对这篇内容有疑问,欢迎到本站社区发帖提问 参与讨论,获取更多帮助,或者扫码二维码加入 Web 技术交流群。
绑定邮箱获取回复消息
由于您还没有绑定你的真实邮箱,如果其他用户或者作者回复了您的评论,将不能在第一时间通知您!
发布评论
评论(4)
简单地回答一下,从您的电脑到服务器的数据包路径上的任何人。
在某些情况下(不安全的网络、无线网络等)会有更多的人。
这是因为密码将以纯文本形式传输。
您可以在 http://en.wikipedia.org/wiki/Packet_capture。
另请检查http://en.wikipedia.org/wiki/File_Transfer_Protocol#Security_problems
To answer briefly, anyone on the path of the packets from your pc to the server.
In some cases (insecure networks, wireless networks, and so on) many more persons.
That's because the password will travel in plain text.
You can see more about packet sniffing at http://en.wikipedia.org/wiki/Packet_capture.
Also check http://en.wikipedia.org/wiki/File_Transfer_Protocol#Security_problems
ftp 和 telnet 均未加密。 这意味着任何能够捕获您的互联网流量的人(例如您的 ISP、托管提供商,也许是政府)都可以在您每次登录时以纯文本形式读取您的密码。 ssh 和 sftp/scp 将对您的密码进行加密,没有人能够读取它。
Both ftp and telnet are unencrypted. That means that anyone who can capture your internet traffic (e.g. your isp, hosting provider, maybe government) can read your password in plain text averytime you login. Ssh and sftp/scp will encrypt your password and none should be able to read it.
是的,通过使用简单的数据包嗅探器,例如 Wireshark ,可以读取 telnet 使用的明文密码并ftp。 尝试在初始化 ftp 或 telnet 会话时使用此工具,您将看到这些机制是多么不安全。
正如本文所标记的,ssh 和 sftp 是更安全的替代方案,因为它们会在数据通过网络传输时对数据进行加密。 并且,一如既往,永远不要使用这些工具来作恶!
Yes, by using a simple packet sniffer, such as Wireshark it is possible to read the plaintext passwords used by telnet and ftp. Try using this tool while initializing a ftp or telnet session and you'll see how non-secure these mechanisms are.
As tagged with this post, ssh and sftp are more secure alternatives as they encrypt the data as it moves across the wire. And, as always, never use these sorts of tools for evil!
任何有嗅探器的人都可以看到它。 请使用安全等效项,即 SFTP 和 SSH。 它们受到强大的加密保护,所有内容都将被加密。
Anyone with a sniffer can see it. Use the secure equivalents i.e. SFTP and SSH instead. They are protected with strong encryption and everything will be encrypted.