Home Books Training Newsletter Resources
Sign up Log in

Cryptography & Security Newsletter

79

The end of FTP in browsers

30 Jul 2021

Feisty Duck’s Cryptography & Security Newsletter is a periodic dispatch bringing you commentary and news surrounding cryptography, security, privacy, SSL/TLS, and PKI. It's designed to keep you informed about the latest developments in this space. Enjoyed every month by more than 50,000 subscribers. Written by Hanno Böck.

With the recent release of Mozilla Firefox version 90, all support for the FTP protocol was removed from the browser. Mozilla followed the lead of Chrome, which also removed all FTP support.

The removal of FTP goes along with the increasing efforts of browsers to default to encrypted connections with HTTPS. In theory, TLS support for FTP is possible, but browsers never supported that. Thus browser downloads via the FTP protocol were never protected against manipulation and eavesdropping.

Some may ask why browsers didn’t instead decide to support FTP with TLS. It turns out that this is quite problematic and prone to security bugs. This stems from the fact that FTP uses a control channel and a separate channel for file transfers, and their interaction is quite fragile.

In 2015, the cross-protocol attacks discovered by Jann Horn showed those weaknesses. Chris Evans, who maintained vsftpd, noted this at that time when he wrote about the “horrors of FTP over SSL.” The recently published ALPACA attack, which we covered last month, shows some variations of these vulnerabilities.

Given these weaknesses, and the fact that there are not many advantages to using FTP these days, it’s understandable that browsers decided to completely remove FTP support.

Subscribe to the Cryptography & Security Newsletter

This subscription is just for the newsletter; we won't send you anything else.

Short News

  • Mozilla published NSS 3.68. Its notable changes include support for SHA2 hardware acceleration with the Intel SHA CPU extension.
  • A detailed security analysis of Active Directory Certificate Services, the PKI implementation from Microsoft, was published by the company SpecterOps.
  • Deutsche Telekom, the largest ISP in Germany, now offers DNS over HTTPS (DoH) on their DNS servers.
  • The Rust Cryptography Interest Group published Awesome Rust Cryptography, a list of cryptography-related software packages for the Rust programming language.
  • The Chrome developers published a blog post explaining their efforts to increase HTTPS adoption and announcing an HTTPS-First mode for future browser versions, a feature similar to the Firefox HTTPS-Only mode.
  • Researchers have published an empirical study of vulnerabilities in cryptographic libraries, noting that many of the issues found (37%) are memory safety issues.
  • OpenSSL has released beta 2 of its upcoming version 3.0.0.
  • The lobbying organization of certificate authorities formerly known as the CA Security Council has announced that it has been renamed. It’s now the Public Key Infrastructure Consortium.

Designed by Ivan Ristić, the author of SSL Labs, Bulletproof TLS and PKI, and Hardenize, our course covers everything you need to know to deploy secure servers and encrypted web applications.

Remote and trainer-led, with small classes and a choice of timezones.

Join over 2,000 students who have benefited from more than a decade of deep TLS and PKI expertise.

Find out More

@feistyduck

Books

  • Bulletproof TLS and PKI
  • ModSecurity Handbook
  • OpenSSL Cookbook

Training

  • Practical TLS and PKI

Resources

  • Newsletter
  • SSL/TLS and PKI History
  • Archived Books
  • Bulletproof TLS Guide

Company

  • Support
  • Website Terms of Use
  • Terms and Conditions
  • Privacy Policy
  • About Us