تبلیغات :
آکوستیک ، فوم شانه تخم مرغی، صداگیر ماینر ، یونولیت
دستگاه جوجه کشی حرفه ای
فروش آنلاین لباس کودک
خرید فالوور ایرانی
خرید فالوور اینستاگرام
خرید ممبر تلگرام

[ + افزودن آگهی متنی جدید ]




نمايش نتايج 1 به 5 از 5

نام تاپيک: syn و ftp

  1. #1
    آخر فروم باز
    تاريخ عضويت
    Jul 2009
    پست ها
    6,351

    پيش فرض syn و ftp

    سلام
    دوستان در مورد syn ack میشه یک توضیحی بدهید؟
    همچنین در مورد ftp passive و ftp active
    در یکی از این ftp ها یادم نیست که فعال یا غیر فعال مشکل این هست که فایروال بلاک میکنه ای پی رو.
    درست یادم نیست اطلاعات میخوام

  2. #2
    آخر فروم باز
    تاريخ عضويت
    Jul 2009
    پست ها
    6,351

    پيش فرض

    مگر نمی گیم روتر بسته های برادکست رو عبور نمیده؟
    پس اگر سیستم ها به وسیله ی روتر به هم وصل شده باشند. چطور dhcp سرور میتونه اطلاعات بده به سیتسم جدید؟
    مگر نباید بسته برادکست کنه؟

  3. #3
    آخر فروم باز
    تاريخ عضويت
    Jul 2009
    پست ها
    6,351

    پيش فرض

    ما را دریابید.

  4. #4
    اگه نباشه جاش خالی می مونه 8086's Avatar
    تاريخ عضويت
    Jan 2010
    محل سكونت
    tehran
    پست ها
    229

    پيش فرض

    سلام
    دوستان در مورد syn ack میشه یک توضیحی بدهید؟
    همچنین در مورد ftp passive و ftp active
    در یکی از این ftp ها یادم نیست که فعال یا غیر فعال مشکل این هست که فایروال بلاک میکنه ای پی رو.
    درست یادم نیست اطلاعات میخوام
    syn , syn-ack , ack چی هستند ؟
    یه جورایی میشه گفت Three-Way-Handshaking اتفاق میفته برای برقراری ارتباط!
    مثلا شما میخوای بستت رو ارسال کنی تو شبکه ! به طرف مقابلت سلام میکنی و میگی که میخوام اطلاعات بفرستم، هستی ؟ ( این میشه syn )
    طرف مقابل در جوابت میگه السلام علیک و رحمه الله و برکته! هستم ، بفرست.( این میشه syn-ack ) یعنی اینکه به syn شما Ack میده.
    بعد شما در جواب آخر میگی پس آماده باش، ممنون. این میشه :
    ack (syn-ack) یعنی شما به syn-ack طرف ack میدین.
    همین.

  5. #5
    اگه نباشه جاش خالی می مونه 8086's Avatar
    تاريخ عضويت
    Jan 2010
    محل سكونت
    tehran
    پست ها
    229

    پيش فرض

    اما در مورد FTP Active و FTP Passive :


    Active FTP

    In active mode FTP the client connects from a random unprivileged port (N > 1023) to the FTP server's command port, port 21. Then, the client starts listening to port N+1 and sends the FTP command PORT N+1 to the FTP server. The server will then connect back to the client's specified data port from its local data port, which is port 20.
    From the server-side firewall's standpoint, to support active mode FTP the following communication channels need to be opened:

    • FTP server's port 21 from anywhere (Client initiates connection)
    • FTP server's port 21 to ports > 1023 (Server responds to client's control port)
    • FTP server's port 20 to ports > 1023 (Server initiates data connection to client's data port)
    • FTP server's port 20 from ports > 1023 (Client sends ACKs to server's data port)

    When drawn out, the connection appears as follows:
    In step 1, the client's command port contacts the server's command port and sends the command PORT 1027. The server then sends an ACK back to the client's command port in step 2. In step 3 the server initiates a connection on its local data port to the data port the client specified earlier. Finally, the client sends an ACK back as shown in step 4. The main problem with active mode FTP actually falls on the client side. The FTP client doesn't make the actual connection to the data port of the server--it simply tells the server what port it is listening on and the server connects back to the specified port on the client. From the client side firewall this appears to be an outside system initiating a connection to an internal client--something that is usually blocked.

    Active FTP Example

    Below is an actual example of an active FTP session. The only things that have been changed are the server names, IP addresses, and user names. In this example an FTP session is initiated from testbox1.slacksite.com (192.168.150.80), a linux box running the standard FTP command line client, to testbox2.slacksite.com (192.168.150.90), a linux box running ProFTPd 1.2.2RC2. The debugging (-d) flag is used with the FTP client to show what is going on behind the scenes. Everything in red is the debugging output which shows the actual FTP commands being sent to the server and the responses generated from those commands. Normal server output is shown in black, and user input is in bold.
    There are a few interesting things to consider about this dialog. Notice that when the PORT command is issued, it specifies a port on the client (192.168.150.80) system, rather than the server. We will see the opposite behavior when we use passive FTP. While we are on the subject, a quick note about the format of the PORT command. As you can see in the example below it is formatted as a series of six numbers separated by commas. The first four octets are the IP address while the last two octets comprise the port that will be used for the data connection. To find the actual port multiply the fifth octet by 256 and then add the sixth octet to the total. Thus in the example below the port number is ( (14*256) + 178), or 3762. A quick check with netstat should confirm this information.
    testbox1: {/home/p-t/slacker/public_html} % ftp -d testbox2 Connected to testbox2.slacksite.com. 220 testbox2.slacksite.com FTP server ready. Name (testbox2:slacker): slacker---> USER slacker 331 Password required for slacker. Password: TmpPass---> PASS XXXX 230 User slacker logged in. ---> SYST 215 UNIX Type: L8 Remote system type is UNIX. Using binary mode to transfer files. ftp> lsftp: setsockopt (ignored): Permission denied ---> PORT 192,168,150,80,14,178 200 PORT command successful. ---> LIST 150 Opening ASCII mode data connection for file list. drwx------ 3 slacker users 104 Jul 27 01:45 public_html 226 Transfer complete. ftp> quit---> QUIT 221 Goodbye.
    Passive FTP

    In order to resolve the issue of the server initiating the connection to the client a different method for FTP connections was developed. This was known as passive mode, or PASV, after the command used by the client to tell the server it is in passive mode.
    In passive mode FTP the client initiates both connections to the server, solving the problem of firewalls filtering the incoming data port connection to the client from the server. When opening an FTP connection, the client opens two random unprivileged ports locally (N > 1023 and N+1). The first port contacts the server on port 21, but instead of then issuing a PORT command and allowing the server to connect back to its data port, the client will issue the PASV command. The result of this is that the server then opens a random unprivileged port (P > 1023) and sends the PORT P command back to the client. The client then initiates the connection from port N+1 to port P on the server to transfer data.
    From the server-side firewall's standpoint, to support passive mode FTP the following communication channels need to be opened:

    • FTP server's port 21 from anywhere (Client initiates connection)
    • FTP server's port 21 to ports > 1023 (Server responds to client's control port)
    • FTP server's ports > 1023 from anywhere (Client initiates data connection to random port specified by server)
    • FTP server's ports > 1023 to remote ports > 1023 (Server sends ACKs (and data) to client's data port)

    When drawn, a passive mode FTP connection looks like this:
    In step 1, the client contacts the server on the command port and issues the PASV command. The server then replies in step 2 with PORT 2024, telling the client which port it is listening to for the data connection. In step 3 the client then initiates the data connection from its data port to the specified server data port. Finally, the server sends back an ACK in step 4 to the client's data port. While passive mode FTP solves many of the problems from the client side, it opens up a whole range of problems on the server side. The biggest issue is the need to allow any remote connection to high numbered ports on the server. Fortunately, many FTP daemons, including the popular WU-FTPD allow the administrator to specify a range of ports which the FTP server will use. See [ برای مشاهده لینک ، با نام کاربری خود وارد شوید یا ثبت نام کنید ] for more information.
    The second issue involves supporting and troubleshooting clients which do (or do not) support passive mode. As an example, the command line FTP utility provided with Solaris does not support passive mode, necessitating a third-party FTP client, such as ncftp.
    With the massive popularity of the World Wide Web, many people prefer to use their web browser as an FTP client. Most browsers only support passive mode when accessing ftp:// URLs. This can either be good or bad depending on what the servers and firewalls are configured to support.

    Passive FTP Example

    Below is an actual example of a passive FTP session. The only things that have been changed are the server names, IP addresses, and user names. In this example an FTP session is initiated from testbox1.slacksite.com (192.168.150.80), a linux box running the standard FTP command line client, to testbox2.slacksite.com (192.168.150.90), a linux box running ProFTPd 1.2.2RC2. The debugging (-d) flag is used with the FTP client to show what is going on behind the scenes. Everything in red is the debugging output which shows the actual FTP commands being sent to the server and the responses generated from those commands. Normal server output is shown in black, and user input is in bold.
    Notice the difference in the PORT command in this example as opposed to the active FTP example. Here, we see a port being opened on the server (192.168.150.90) system, rather than the client. See the discussion about the format of the PORT command above, in the [ برای مشاهده لینک ، با نام کاربری خود وارد شوید یا ثبت نام کنید ] .
    testbox1: {/home/p-t/slacker/public_html} % ftp -d testbox2 Connected to testbox2.slacksite.com. 220 testbox2.slacksite.com FTP server ready. Name (testbox2:slacker): slacker---> USER slacker 331 Password required for slacker. Password: TmpPass---> PASS XXXX 230 User slacker logged in. ---> SYST 215 UNIX Type: L8 Remote system type is UNIX. Using binary mode to transfer files. ftp> passive Passive mode on. ftp> lsftp: setsockopt (ignored): Permission denied ---> PASV 227 Entering Passive Mode (192,168,150,90,195,149). ---> LIST 150 Opening ASCII mode data connection for file list drwx------ 3 slacker users 104 Jul 27 01:45 public_html 226 Transfer complete. ftp> quit---> QUIT

    هر جا که مشکل داشتین بپرسین.
    با تشکر







    ---------- Post added at 06:37 PM ---------- Previous post was at 06:36 PM ----------


    مگر نمی گیم روتر بسته های برادکست رو عبور نمیده؟
    پس اگر سیستم ها به وسیله ی روتر به هم وصل شده باشند. چطور dhcp سرور میتونه اطلاعات بده به سیتسم جدید؟
    مگر نباید بسته برادکست کنه؟


    RARP Protocol
    نمیدونم منظورتون این بود یا نه ؟!
    اگه نه که بیشتر توضیح بدین!
    با تشکر

Thread Information

Users Browsing this Thread

هم اکنون 1 کاربر در حال مشاهده این تاپیک میباشد. (0 کاربر عضو شده و 1 مهمان)

User Tag List

قوانين ايجاد تاپيک در انجمن

  • شما نمی توانید تاپیک ایحاد کنید
  • شما نمی توانید پاسخی ارسال کنید
  • شما نمی توانید فایل پیوست کنید
  • شما نمی توانید پاسخ خود را ویرایش کنید
  •