Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Introduced Safer FTP Alternative: Added FTP_TLS #15137

Merged
merged 1 commit into from
Nov 20, 2023

Conversation

fazledyn-or
Copy link
Contributor

@fazledyn-or fazledyn-or commented Nov 20, 2023

Changelog: Feature: Added FTP_TLS option using secure argument in ftp_download for secure communication.
Docs: Omit

Documentation added to the docstrings here: #15294


Details

While triaging your project, our bug fixing tool generated the following message(s)-

In file: files.py, method: ftp_download, a clear-text protocol such as FTP, Telnet or SMTP is used. These protocols transfer data without any encryption, which expose applications to a large range of risks. iCR suggested that data should be transferred over only secure transport channels.

Changes

  • Added FTP_TLS as an option

Previously Found & Fixed

CLA Requirements

This section is only relevant if your project requires contributors to sign a Contributor License Agreement (CLA) for external contributions.

All contributed commits are already automatically signed off.

The meaning of a signoff depends on the project, but it typically certifies that committer has the rights to submit this work under the same license and agrees to a Developer Certificate of Origin (see https://developercertificate.org/ for more information).
- Git Commit SignOff documentation

Sponsorship and Support

This work is done by the security researchers from OpenRefactory and is supported by the Open Source Security Foundation (OpenSSF): Project Alpha-Omega. Alpha-Omega is a project partnering with open source software project maintainers to systematically find new, as-yet-undiscovered vulnerabilities in open source code - and get them fixed – to improve global software supply chain security.

The bug is found by running the Intelligent Code Repair (iCR) tool by OpenRefactory and then manually triaging the results.

Signed-off-by: fazledyn-or <ataf@openrefactory.com>
@CLAassistant
Copy link

CLAassistant commented Nov 20, 2023

CLA assistant check
All committers have signed the CLA.

Copy link
Member

@memsharded memsharded left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Many thanks for your contribution @fazledyn-or !

It is looking good.
The ftp_download is not tested because it was problematic in CI.
Have you tested this manually?

@memsharded memsharded added this to the 2.0.15 milestone Nov 20, 2023
@fazledyn-or
Copy link
Contributor Author

I couldn't test manually since I don't have an FTP server set up.

However, if I find opportunity, I'll do so and notify here.

@memsharded
Copy link
Member

I couldn't test manually since I don't have an FTP server set up.

What was the driver/reason to submit this PR then? 🙂 I thought that you had needed this to connect to some ftp server safely

@fazledyn-or
Copy link
Contributor Author

We're working in collaboration with OpenSSF in Project Alpha Omega. We are using various SAST tools to scan top 10,000 Python & Java projects in GitHub. Based on the reports, we triage manually and fix the bugs found in open source projects.

The SAST tools generate results where plain text communication such as SMTP, FTP, HTTP are used. In those cases, such as this one, we add safer alternatives (SMTP with SSL/TLS, FTP TLS, etc.). Which aren't actually bug fixes, rather feature implementation.

@memsharded memsharded merged commit c106acc into conan-io:release/2.0 Nov 20, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants