Opened 23 years ago
Last modified 18 years ago
#1594 closed Feature request
Support for SSH tunnelled ftp.
Reported by: | rasjidw | Owned by: | |
---|---|---|---|
Priority: | normal | Component: | Other |
Keywords: | Cc: | rasjidw, Tim Kosse | |
Component version: | Operating system type: | ||
Operating system version: |
Description
Could I suggest that the FileZilla Client ignores the
IP address returned by an FTP server in response to
the PASV command, and just uses the port number
returned with the original IP address for the
connection? Or that this is at least an configuration
option??
This would enable to use SSH port forwarding to
connect to an ftp server behind a firewall in passive
mode with all traffic encrypted.
(This does assume that the ftp server concerned has a
small defined range of ports it uses for passive mode.)
eg, Suppose I have a SSH link between Box A and Box B,
with port 21 and the defined range of passive ports
port forwarded from A to B (ports 4096-5000 say).
Suppose Box B has an internal IP address of
192.168.3.47.
On Box A, if I connect to 'localhost:21', everything
is fine until the PASV command, when Box B returns:
227 Entering Passive mode (192,168,3,47,16,0).
If FileZilla ignored the IP address returned, and just
used the IP address of the original connection (in
this case 127.0.0.1) with port 4096 (as returned by
the passive command) then everything would be really
cool, and ftp over a ssh forwarded connection would
work!
Rasjid.
FTP has not been designed to be used like this, won't be
implemented.