EPSV is a command issued by an FTP/S client to signal the server that it wishes to enter into what is known as Extended Passive Mode. But what is Extended Passive Mode and when is it appropriate to use EPSV? Let’s find out.Read More
Managed File Transfer and Network Solutions
JSCAPE MFT Server's Network Storage module (formerly known as Reverse Proxy) makes it possible to extend the storage of your managed file transfer server to various remote services and storage solutions like SFTP servers, Samba shares, Amazon S3 buckets, Azure Files folders, and many others. This can come in handy when your MFT Server machine has limited storage capacity or if you simply want to store certain user files in another place. One of the supported remote services is FTP/S. If you have an FTP or FTPS server with lots of free storage space and you want to use that as a network storage for your MFT Server, you might want to read this tutorial.Read More
JSCAPE MFT Server encrypted file transfer protocols like SFTP and those secured through TLS (e.g. HTTPS, FTPS, AS2, OFTP, and WebDAVS) can be configured for FIPS compliance. Since this is a function that isn't switched on by default, you might wonder if it's necessary to enable it at all.Read More
There will be times when you'll want to transfer files over a secure connection. One option is to use FTPS (FTP over SSL) which provides data-in-motion encryption through SSL (Secure Sockets Layer). When you setup an FTPS service in JSCAPE MFT Server, you'll notice that you actually have 3 modes to choose from explicit SSL, forced explicit SSL and implicit SSL.
This post was originally published on May 6, 2012 but was updated and republished on November 4, 2018.
The security of any SSL/TLS-protected connection largely depends on the client and server's choice of cipher suites. If you use file transfer protocols like HTTPS, FTPS, and AS2 but don't know what cipher suites are, you will want to read this post.Read More
Theoretically, RSA keys that are 2048 bits long should be good until 2030. If so, isn't it a bit early to start using the 4096-bit keys that have become increasingly available in encryption-enabled applications? It depends.Read More
Last time, we tackled the problem system administrators encounter when their passive FTP or FTPS connections have to pass through a NAT firewall or router. A similar problem can happen when you're dealing with the same type of connections and a reverse proxy. It gets even more complicated when you have to deal with both external and internal users. Let me show you how to deal with that.Read More
It’s never easy to set up an FTP server the moment firewalls get involved. But it gets even more difficult once you start using the secure version of FTP, known as FTPS. In this post, we’ll talk about the problem you’ll usually encounter when your FTPS server is behind a firewall and your client is attempting to perform a file transfer using passive mode or PASV.Read More
Data integrity checks are vital to secure communications. They enable communicating parties to verify the integrity and authenticity of the messages they receive. In secure file transfer protocols like FTPS, SFTP, and HTTPS, data integrity/message authentication is usually achieved through a mechanism known as HMAC. In this post, we explain what HMAC is, its basic inner workings, and how it secures data transfers.Read More