By Rich Loeber
FTP (File Transfer Protocol) is a nice and easy way to communicate between systems. With FTP on your IBM i, you can transfer files to other systems, including other IBM i’s, with ease. You can also use it to move programs and files between systems, all with relative ease. But, increasingly, FTP is also becoming the hackers weapon of choice when cruising the Internet. And, with FTP’s QUOTE command (among others), a knowledgeable hacker could do some serious damage to your system.
I tell you this based on personal experience with my own IBM i. In a recent 7 day period, I identified more than 1,500 attempts to sign-on to my system from people not authorized. All of these were malicious hacking attempts. When I did a Trace Route on many of these, they pointed back to source IP addresses in The Netherlands, China, Colombia, Russia and other parts unknown. Some attempts would not even trace back successfully.
I initially thought that nobody would bother my system since it is just a numbered address with no DNS entry to make it easy to find. But, this is clearly not the case. Some hackers use automated attack programs to just cycle through entire IP address ranges, and these are the folks who regularly stop in at my system.
The method used, from my personal observation, is to break in using the same user profile, usually ADMINISTRATOR, trying a different password every few seconds. They will often cycle through and retry the same password more than once. I’ve observed one break-in artist try this 850 times in a row over a period of several hours.
I know all this about my system because I monitor all network traffic and track it using our exit point software. We have our system configured to only permit FTP access from trusted IP addresses. The list is, necessarily, very small. This protects our system from malicious remote access via FTP. Also, if a hacker were to get past this check (which they never have so far), our system has no default passwords, so trying to cycle through known IBM i profiles and default passwords will also end up in failure.
So, what can you do to protect your system from FTP attackers?
First, make sure that you don’t have any default passwords set up on your system. Use the Analyze Default Passwords (ANZDFTPWD) command from the SECTOOLS menu for this. Initially, run it with the *NONE option for the ACTION parameter just to get a listing. Then, when you’ve reviewed the list, make sure that the profiles with default passwords have their passwords reset to either a different, unique password or are set to *NONE.
Next, implement some sort of IP packet testing to only accept FTP connections from trusted IP addresses. You can do this like we do using an exit program attached to the FTP sign-on server. Or, if you have a fairly recent version of the OS, you can use the IP packet filtering capabilities in IBM i Navigator. This will let you allow known IP addresses, or address ranges, to access your system while keeping everyone else out. When setting this up, make sure you keep an active connection to your system while you are testing so that you don’t accidentally shoot yourself in the foot and lock out all access to your system. Remember, the IP packet filtering will apply to all users connecting to your system, not just FTP users, so this will be a bigger job than you may think starting out.
If you have any questions about this topic you can reach me at (rich at kisco dot com), I’ll try to answer any questions you may have. All email messages will be answered.