The Time-out interval for inactive jobs (QINACTITV) system value does not affect FTP sessions.
When you use FTP batch support, the program must send both the user ID and the password to the system. Either the user ID and password must be coded in the program, or the program must retrieve them from a file.
Both of these options for storing passwords and user IDs represent a potential security exposure. If you use FTP batch, ensure that you use object security to protect the user ID and password information. You should also use a single user ID that has limited authority on the target system. It should have only enough authority to perform the function that you want, such as file transfer.
FTP provides remote-command capability, just as advanced program-to-program communications (APPC) and iSeries™ Access for Windows® do.
The RCMD (Remote Command) FTP-server subcommand is the equivalent of having a command line on the system. Before you allow FTP, ensure that your object security scheme is adequate. You can also use the FTP exit program to limit or reject attempts to use the RCMD subcommand. FTP exit programs describes this exit point and provides sample programs.
A user can access objects in the integrated file system with FTP. Therefore,
you need to ensure that your authority scheme for the integrated file system is adequate when you run the FTP server on your system.
A popular hacker activity is to set up an unsuspecting site as a repository for information. Sometimes, the information might be illegal or pornographic. If a hacker gains access to your site through FTP, the hacker uploads this undesirable information to your system. The hacker then informs other hackers of your FTP address. They, in turn, access your system with FTP and download the undesirable information.
You can use the FTP exit programs to protect against this type of attack. For example, you might direct all requests to upload information to a directory that is write-only. This defeats the hacker's objective, because the hacker's friends will not be able to download the information in the directory.
Parent topic:
Securing File Transfer Protocol
Related concepts
Configuring anonymous File Transfer Protocol