Newsgroups: comp.dcom.sys.cisco
Path: utzoo!utgpu!cunews!bnrgate!bwdls61!bnr.ca!bschmidt
From: bschmidt@bnr.ca (Ben Schmidt (BNR))
Subject: Re: Wide Area ApplTalk
Message-ID: <1991Mar13.235308.9208@bwdls61.bnr.ca>
Sender: usenet@bwdls61.bnr.ca (Use Net)
Organization: Bell-Northern Research
References:<1991Mar5.005841.23836@bwdls61.bnr.ca> <9176@etsu.CMI.COM>
Date: Wed, 13 Mar 1991 23:53:08 GMT

In article <9176@etsu.CMI.COM> kevinh@cmi.com (Kevin Hegg) writes: 
> I understand setting up passwords with NCSA Telnet, but doesn't this 
apply 
> only to NCSA Telnet users? We are just now implementing a WAN with a 
> number of outside access points, so security is becoming more of a 
concern 
> than before. Anyway, there is a stack called HyperFTP which is readily 
> available. I don't see any mechanism to prevent someone from using this 
to 
> FTP to any Mac. Does anyone know of a way to prevent uncontrolled access 
> to Macs with HyperFTP or any similar program? Is Apple doing anything to 
> improve the security of Macs using MacTCP? It seems to me that the 
proper 
> place for security is in the MacTCP software.

HyperFTP implements an FTP client, not a server.  It's use on any Mac does 
not compromise the security of that Mac.  

The only Macs whose file security is potentially at risk are those Macs 
running FTP servers.  The most common FTP server implementation on a Mac 
is that built into most mac telnets.  Hence secure the Mac telnets by 
disabiling FTP by default, or by adding a password, and you've secured all 
the Macs on your network from inadvertent FTP access.

Ben Schmidt     Bell-Northern Research, Ltd.   Ph: (613) 763-3906
Information     P.O. Box 3511, Station C       FAX:(613) 763-3283
Technology      Ottawa Canada K1Y 4H7          bschmidt@bnr.ca 
