In this File
Security Update: Release 7.7 includes OpenSSL 1.0.1l, which contains nine new security fixes described here: https://www.openssl.org/news/secadv_20140806.txt. These are DoS and SSL downgrade attack vectors that are applicable to WS_FTP Server.
Security Update: Release 7.6.3 includes all prior upgrades that addressed the Heartbleed vulnerability, and includes OpenSSL version 1.0.1h.
Security Update on SSL/TLS MITM (Man-in-the-middle) vulnerability (CVE-2014-0224): The recent vulnerability uncovered in OpenSSL has affected vendors and companies that rely on this near-ubiquitous open source security protocol. In basic terms, the vulnerability exposes an OpenSSL to OpenSSL exchange that uses the OpenSSL 0.9.8, 1.0.0 and 1.0.1 family of protocols to an attack. This vulnerability affects all releases starting with 7.1 through the 7.6, 7.6.1 and 7.6.2 versions of WS_FTP Server.
The WS_FTP Server 7.6.2.1 patch release upgrades OpenSSL to the 1.0.1h version, which removes this vulnerability.
Check your version number to see if you need to upgrade.
Note also that we have released updated install programs for the Web Transfer Module and the Ad Hoc Transfer Module. Neither of the modules is affected by the MITM SSL issue, but we updated the install programs to be compatible with the WS_FTP Server 7.6.2.1 patch release. You need to use the 7.6.2.1 versions of the install programs.
Security Update on Heartbleed SSL: Heartbleed SSL, the recent vulnerability uncovered in OpenSSL, has affected vendors and companies that rely on this near-ubiquitous open source security protocol. In basic terms, the vulnerability exposes any exchange that uses the OpenSSL 1.0.1 family of protocols to an attack. This vulnerability affects only the 7.6 and 7.6.1 versions of WS_FTP Server.
The WS_FTP Server 7.6.2 patch release disables the heartbeat function that exposed the vulnerability in the OpenSSL 1.0.1c version and a later release will provide an update to a version of OpenSSL (1.0.1g or later) that has addressed this issue.
If you have an affected version, you have already received a notification from the Ipswitch Security Team. Check your version number to see if you need to upgrade. Systems that may have exposed this vulnerability should regenerate any sensitive information (secret keys, passwords, etc) with the assumption that an attacker has already used this vulnerablity to obtain those items.
Note also that we have released updated install programs for the Web Transfer Module and the Ad Hoc Transfer Module. Neither of the modules is affected by the Heartbleed SSL issue, but we updated the install programs to be compatible with the WS_FTP Server 7.6.2 patch release. If you are doing a new installation of these modules, you need to use the 7.6.2 version of the install programs.
This document contains information on how to install and configure WS_FTP™ Server, WS_FTP Server with SSH, and WS_FTP Server Corporate. Depending on which WS_FTP Server product you have purchased, portions of this document may not apply.
The document also describes how to install and configure add-on modules for the WS_FTP Server and WS_FTP Server with SSH.
Ipswitch WS_FTP™ Server is a highly secure, fully featured and easy-to-administer file transfer server for Microsoft Windows® systems. WS_FTP Server lets you create a host that makes files and folders on your server available to other people. Users can connect (via the Internet or a local area network) to your host, list folders and files, and (depending on permissions) download and upload data. Administrators can control access to data and files with granular permissions by folder, user, and group. Administrators can also create multiple hosts that function as completely distinct sites.
WS_FTP Server is proven and reliable. It is used by administrators globally to support millions of end users and enable the transfer of billions of files.
WS_FTP Server complies with the current Internet standards for FTP and SSL protocols. Users can connect to the server and transfer files by using an FTP client that complies with these protocols, such as Ipswitch WS_FTP LE or Ipswitch WS_FTP Professional.
WS_FTP Server with SSH also includes support for SFTP transfers over a secure SSH2 connection.
Administration
Performance
Security and Compliance
The WS_FTP Server product family provides a broad range of file transfer functionality, from fast file transfer via the FTP protocol, to secure transfer over SSH, to a complete file transfer (server/client) solutions.
WS_FTP Server: Our base product offers fast transfer via the FTP protocol with the ability to encrypt transfers via SSL, and includes FIPS 140-2 validated encryption of files to support standards required by the United States and Canadian governments.
WS_FTP Server can operate standalone or is easily integrated with existing user databases (Active Directory, Windows NT, ODBC). The WS_FTP Server Manager provides web-based administration from the local machine and also allows remote management of the server. The Server Manager can use our integrated web server or Microsoft IIS.
When used with our WS_FTP Professional client, WS_FTP Server can retry a failed transfer, perform file integrity checks, verify a user's identity, and speed transfers by using compression and multi-part transfers.
WS_FTP Server is designed with a tiered architecture that allows components and data to be maintained on one computer or distributed among several, allowing the configuration to scale to handle larger capacity.
WS_FTP Server can be deployed in an active-passive failover configuration to ensure file transfer service is always available. The failover configurations use shared resources for the user database, configuration data, and the file system for user directories and log data.
WS_FTP Server with SSH: This product offers all of the features of WS_FTP Server plus the ability to send and receive files over SSH, which automatically delivers encrypted communications during and throughout file transport.
WS_FTP Server Corporate: This product extends the secure transfer capabilities of WS_FTP Server with SSH to include:
Support for SCP2 to provide a secure version of the remote copy capability used in UNIX applications
LDAP support for authentication to leverage existing corporate databases.
Integrates the WS_FTP Server Web Transfer Module to provide a complete file transfer solution (server and client).
The WS_FTP Server Web Transfer Module, an add-on to WS_FTP Server products, enables users to transfer files between their computers and company servers over HTTP/S using a Web browser. As a result, employees and external business partners can connect to company networks simply and securely to share files, data, and other critical business information.
The WS_FTP Server Ad Hoc Transfer Module, an add-on to WS_FTP Server products, lets users send files from their computers to one or more individuals by sending an Ad Hoc Transfer message via email. Recipients of an Ad Hoc Transfer "package" can connect to a download page, hosted on the WS_FTP Server, and download the files that have been "sent" to them. This module lets your users send a secure transfer to colleagues and clients, without the need to set up temporary accounts.
Users can send a package by using the Ad Hoc Transfer web interface or Microsoft Outlook.
We have issued a maintenance release of Ad Hoc Transfer Module and the Ad Hoc Transfer Plug-in for Outlook that provides the following enhancements and bug fixes:
To upgrade to this release, you need to install:
Your WS_FTP Server version (v 7.6) does not need to be updated.
-o homefolder
argument to set a user's home folder.Version 7.6 updates some of the critical software components used by the WS_FTP Server, including SSL libraries, supported databases, and supported operating systems.
If you choose to disable the CBC ciphers, Ipswitch WS_FTP Professional versions before v12.4 will not be able to connect using SSH. Older versions of other FTP clients may also use CBC ciphers.
PostgreSQL: The version of PostgreSQL used by WS_FTP Server has been upgraded from 8.3.12 to 8.3.20. This was done to resolve known security vulnerabilities with older versions of PostgreSQL.
Microsoft SQL Server: WS_FTP Server now supports Microsoft SQL Server 2012, in addition to the 2008 version. Support for Microsoft SQL 2005 has been dropped.
This release includes enhanced features for the Ad Hoc Transfer Plug-in for Outlook:
You can add your own brand or organization information to the user interface. You can change logos, icons, and text labels and you can also customize the associated help topics.
The silent install program has been enhanced to ease the deployment of the Ad Hoc Transfer Plug-in to large numbers of users, and also to support deployment via Group Policy. The changes include supporting installation on a PC for "all users" rather than for a single user, and specification of default install properties.
The default install properties allow an administrator to configure the plug-in to connect to the WS_FTP server. To complete the configuration, each user will need to enter their WS_FTP password (and possibly their username). In most cases, after using the silent install or group policy, the username will be already configured on the end user's computer.
Also, when using the Group Policy to deploy the plug-in, the installation program is now run by the "System" user, which fixes a defect in the previous version.
For more information, see the "Ad Hoc Transfer Plug-in for Outlook Install Guide," on the WS_FTP Support site.
This release also brings a roll-up of enhancements and bug fixes from ongoing maintenance efforts. For more information, see the "Fixed in 7.6" section.
Version 7.5.1 introduces failover support to the WS_FTP Server family of products. You can now deploy WS_FTP Server on a two-node failover cluster in a Windows Server environment using Microsoft Cluster Services (MSCS) or Microsoft Network Load Balancing (NLB). The failover solution consists of one "active" and one "passive" node, each running identical configurations of WS_FTP Server. If the primary node is unavailable, or if a server (FTP or SSH) is unavailable on the primary node (MSCS only), processing switches over to the secondary node. This two-node configuration uses shared resources for the user database, configuration data (SQL Server), and the file system for user directories and log data.
Version 7.5.1 also includes multiple SSH improvements:
Version 7.5 introduces the Ad Hoc Transfer capability to the WS_FTP Server family of products. Ad Hoc Transfer lets your users send file transfers to an individual, rather than to a folder or file transfer site. Files can be sent to any valid email address, meaning you do not have to maintain accounts for all recipients, or set up temporary accounts.
Files sent via Ad Hoc Transfer are stored in a folder on the WS_FTP Server computer. Recipients receive a notification in their email inbox, and click on a web link to access the posted files.
As the administrator, you can set options that require Ad Hoc Transfers to be password protected, and to manage the size and availability of an Ad Hoc Transfer "package," which is the user-generated email message plus associated files.
The Ad Hoc Transfer Module provides two ways for a WS_FTP Server user to send a transfer:
Version 7.1 includes the following new features:
Version 7 introduces a third product offering, WS_FTP Server Corporate, to the WS_FTP Server family of products. WS_FTP Server Corporate offers a convenient way to purchase the full range of secure, managed file transfer functionality that we provide. For a description of each of the WS_FTP Server product offerings and the major features included, see WS_FTP Server Product Family.
Version 7 is a major release that includes the following new features:
The IP Lockouts feature is designed to thwart dictionary attacks, which can shut down a server by flooding it with connection requests. WS_FTP Server can monitor connection attempts, identify possible abuse, and deny access to the FTP and SSH servers for the offending IP address.
The IP Lockouts feature lets the administrator set the criteria for blocking an address (or subnet range), manually add an approved address to the whitelist, or manually add a problem address to the blacklist.
From the Server Manager, select Server > IP Lockouts.
WS_FTP Server supports standard implementations of LDAP, including Microsoft's Active Directory, OpenLDAP, and Novell's eDirectory. Administrators can configure a WS_FTP Server host to use an LDAP database for the user database. Failover to a secondary LDAP database is supported, and communications are secured via SSL.
The LDAP user database option is selected from the Create Host page. Selecting Configure opens the LDAP Configuration page.
WS_FTP Server supports SCP2 protocol (i.e. SCP over SSH2), which leverages SSH to provide authentication and secure transfer. In addition, the WS_FTP implementation of SCP2 has the benefit of leveraging any users, rules, and notifications created for the WS_FTP server host. For an SCP client, users can use either OpenSSH or PuTTY SCP.
The Enable Secure Copy (SCP2) is on the Edit Listener page when you select an SSH listener.
FIPS 140-2 sets a standard for encoding data (cryptography) that is required of many military and government organizations. WS_FTP Server provides FIPS 140-2 validated ciphers to encrypt file transmissions. The administrator can enable FIPS mode for the FTPS and SSH services.
FIPS mode does not apply to FTP and HTTP services. FIPS mode ensure that all secure listeners use FIPS 140-2 validated cryptographic algorithms. If you use the default WS_FTP Server certificate, you will have to create a new certificate.
The Operate in FIPS 140-2 Mode option is on the System Details page.
C:\Program Files\Ipswitch\WS_FTP Server
C:\Program Files (x86)\Ipswitch\WS_FTP Server
Tip: If a listed requirement is hyperlinked, you can click the link to get more information on obtaining and installing that prerequisite.
Supported Operating Systems
For a standalone WS_FTP Server installation:
Operating System |
Edition |
Service Packs |
Supported Versions |
Windows Server 2012 R2 |
|
|
|
Windows Server 2012 |
|
|
|
Windows Server 2008 |
|
SP2 or later |
|
Windows Server 2008 R2 |
|
|
|
For a WS_FTP Server failover cluster using Microsoft Clustering Services:
Operating System |
Edition |
Service Packs |
Supported Versions |
Windows Server 2012 R2 |
|
|
|
Windows Server 2012 |
|
|
|
Windows Server 2008 |
Enterprise |
SP2 or later |
|
Windows Server 2008 R2 |
Enterprise |
|
|
For a WS_FTP Server failover cluster using Microsoft Network Load Balancing:
Operating System |
Edition |
Service Packs |
Supported Versions |
Windows Server 2012 R2 |
|
|
|
Windows Server 2012 |
|
|
|
Windows Server 2008 |
|
SP2 or later |
|
Windows Server 2008 R2 |
|
|
|
System Requirements
If you plan to install the WS_FTP Server Web Transfer Client, make sure that Microsoft .NET Framework 3.0 is installed.
Recommended Hardware
The minimum recommended hardware is the same as recommended for Windows Server 2008. (For more information, see the Windows Server information on Microsoft's web site.) If you are using a later version operating system, you should meet the hardware requirements for that system.
Component |
Requirement |
Processor |
|
Memory |
|
Available disk space |
|
Virtualization Requirements
All requirements for WS_FTP Server (above), plus:
Ipswitch Notification Server is a part of WS_FTP Server and is typically installed on the same machine.
The WS_FTP Server Manager provides web-based administration from the local machine and also allows remote management of the server.
Server Requirements:
Client Requirements:
WS_FTP Server Server Manager is a part of WS_FTP Server and is installed on the same machine.
The WS_FTP Server installer automatically activates certain components in your Windows Server installation. This is necessary because after installation, Windows Server does not turn on non-core operating system components. However, before installing WS_FTP Server, you should be sure that these changes conform to your organization’s security policies.
When you install WS_FTP Server, the install activates the following 2008 Server roles:
Note: If you are installing the WS_FTP Server Web Transfer Client, there are additional components activated. See "System requirements for WS_FTP Server Web Transfer Client" below.
For detailed instructions for installing and configuring WS_FTP Server and activating a new or upgraded license, see the WS_FTP Server Installation and Configuration Guide.
The following issues were addressed in V7.7:
Fixed a problem that allowed a user to write to another user's home folder, for which the first user had neither read nor write permissions. User was able to upload files and overwrite files in directories to which he did not have permission by including double backslashes (%5c) in the file name.
An attacker could impersonate a user by abusing an authenticated session ID (SID). Fixed this issue by renewing the session ID when a user logs in.
When creating an SSH User Key, a passphrase is supposed to be optional, but was resulting in an error when no passphrase was included. This has been fixed to handle the case when no passphrase is included.
After installing the Web Transfer Module, Remote Desktop sessions to the server no longer work due to an issue with the certificate on the server. This issue was fixed within the Web Transfer Module install program.
In version 7.6.3, when creating a new SSL certificate the following error message may display: "Wrong number of arguments or invalid property assignment". The error occurs for all three key sizes. The issue has been fixed.
If host default was set to automatically delete expired users after X days, and new user was created and set to expire X amount of days after last login, the user would appear as expired in the Users list. This issue has been fixed.
When using the WS_FTP Server Manager and creating a new Virtual Folder, the Get Value was shown after saving the settings, instead of the default or days set for files and subfolders. When returning to the newly created virtual folder, it does then display the correct days. Worked correctly with IIS WSFTP Server Manager. This issue has been fixed.
If "Auto create users' home folders" is disabled and the user has "Lock user to home folder" enabled and the home folder doesn't exist, an exception occurs. This exception handling issue also caused:
Updated exception handling code to fix these issues.
Modified the code so the logon count is not incremented if the logon is auth-none and this a multi-factor authentication. This will still increment failures in the secondary check. On the host, set IP Lockout Settings > Failed Connection attempts to 11.
OpenSSL Issues
After upgrading to WS_FTP Server 7.6.3, some customers could not install or log in to the web modules (Web Transfer Module and Ad Hoc Transfer). This issue is fixed by the new version of OpenSSL (libeay32.dll, ssleay32.dll).
The following issues were addressed in V7.6.3:
Added a new LDAP configuration option "Force Simple Binding" that when enabled, will default back to the simple binding method used in pre-7.6 versions of WSFTP Server.
If the administrator had set Force Change Password on an account and that user then attempted to log in, that user did not have to provide the correct password for the change password dialog to appear. Fixed this so that now the user must provide the correct current password before being allowed to change the password.
Difficulties were experienced when downloading files from WS_FTP Server using Coldfusion, or OpenSSH command line clients and SFTP. The openSSH and ColdFusion clients issued a STAT command before attempting to download the file, and if the STAT command failed, they never attempted to read the file. In WS_FTP Server, the STAT command failed if the filename was not issued with the exact filename (matching case). There was a case-sensitive comparison of the filename when the STAT command was issued. Fixed this issue.
Vulnerability allowed an attacker to commit theft over cookies that do not using a secure parameter (in https). During the sniffing process, the attacker can see the current value of the cookies to be used for login. For WTM and AHT, all cookies now use the "HttpOnly" flag, and if the connection is secure, they also use the "Secure" flag.
There was a failure to check the proper variables when determining whether or not a whole file had been downloaded, which led to the system thinking it had not downloaded the whole file when closing the connection. Fixed this issue.
After adding a blackout notification on the server, clicking save, restarting the services and then returning to the IP Lockout Settings in the Manager, the notification did not display. In 7.5 there was a modification to have blacklist notifications all show up regardless of the host, using ID '0' in the host_rules table for this rule. However, old entries in host_rules were not updated to use ID '0' when upgrading to 7.5+, so none of these rules would show up in the UI after an upgrade, as it explicitly looks for ID '0'. Fixed this issue.
A file with a file name over 132 characters could be successfully uploaded to the Ad Hoc Transfer package folder, but when that file was downloaded, the filename would be truncated in the database and the download would fail with a 'file not found' error. We were using an array limited to 128 characters in one function where the file name was passed through. That array has been updated to 512 characters (matching the database field max), which fixes the issue.
After setting an email notifications in WS_FTP Server to send to multiple email recipients, only the first two email accounts received notifications; no other users received notifications. This was a known issue related to a character limit with the Send To field in a telnet style email. An encoding function was being run against the list of 'To' addresses, which was adding some unnecessary additional characters which weren't needed. The encoding function no longer adds these unnecessary characters. The recipient list can now contain up to 500 characters.
We were including comments at the end of the public key (which are auto-generated in Linux systems) as a part of the key itself, so the fingerprints being generated were inaccurate. The fix modifies the Server to not read those comments as part of the key during the login process, so administrators do not need to re-import any keys.
Configuration changes were made to the application to ensure that the View State data is sufficiently protected by setting the viewStateEncryptionMode to "Always."
Replaced pkgmgr.exe with servermanagercmd.exe in the core and module installers. This has improved the performance of this piece of the install by approximately a magnitude of ten.
The exploit took advantage of the unquoted service paths vulnerability outlined in CVE-2005-1185, CVE=2005-2938 and CVE-2000-1128. The vulnerability took advantage of the way Windows parsed directory paths to execute code. Fixed this issue by placing double quotes around the path to the service when providing it to whatever function creates the service. Clean installs will now install services with quoted image paths. During an upgrade or maintenance, the WS_FTP Server installer will check existing service image paths and quote them if they currently aren't quoted.
Affected only the CD into the initial virtual folder; sub-directories under that did accept either upper or lower case CD commands. Fixed this issue by modifying the query to allow case-insensitive searches.
Customers needed the ability to disable SSL v1 and v2 in WS_FTP Server, but leave SSL v3 and TLS enabled on the server. PCI compliance scans were failing when SSL v2 was enabled. The only option was to disable all but TLS. Fixed this issue by adding a new option to the listener encryption settings page: "Enable TLS and SSL version 3."
Fixed the issue by fine-tuning the way usernames are located from within cookies.
Fixed this issue. Previously, headers returned to the client for the file download included a negative file size if the file was larger than 2 GB, which caused IE to break and other browsers to not be able to report total downloaded file size. Files larger than 2 GB can now be downloaded, renamed, and deleted in all browsers and downloaded file sizes are correct.
We now allow 10 times the number of files/folders.
On Windows Server 2008R2, if the WS_FTP Server and SSH Server services lose access to the SQL database, they remain in a prolonged stopping state. These services should each now take around 15-20 seconds to shut down if the database is down.
Server does not attempt to connect to the secondary LDAP server when the primary server fails. Fixed the issue by updating the DLL file for the LDAP connection.
Fixed this issue. WTM wasn’t being notified when blacklist items were removed because it didn't have a 'heartbeat' process set up that was enabled for AHT/FTP/SSH. It should now behave the same as the other interfaces. It may take a few minutes, but now users will be able to log in after their IP has been removed from the blacklist without needing an IIS reset.
When the WS_FTP Server generates an SSH user key it prompts for a passphrase, but when that key is imported into an SFTP client the passphrase is never requested. The OpenSSL functions were not correctly generating the PEM-formatted key with encryption. Fixed this issue by specifying 3DES encryption when writing the key file.
When multiple SSH listeners were created to listen on unique IP addresses and then WS_FTP Server was upgraded, not all SSH listeners would have the new CTR ciphers added, however, the ciphers could be added manually. Fixed this issue so that upgrading does add the CTR ciphers to the other listener IPs.
When entering details for a syslog server you could not use the host name and had to use the IP address. Fixed this issue by adding a function call to resolve the host names.
There was a race condition where the permissions object could sometimes be released before it was accessed when checking permissions for a file. This issue is now fixed.
The following issues were addressed in V7.6:
Administrators can now configure a custom port to be used when sending SMTP notifications; port 25 was required for all SMTP notifications prior to this update.
The version of PostgreSQL used by WS_FTP Server has been upgraded from 8.3.12 to 8.3.20. This was done to resolve known security vulnerabilities with older versions of PostgreSQL.
A race condition on busy systems using FTP and/or SSH was capable of causing those services to crash due to corrupt memory. This bug has been fixed.
The commands "dir ." and "dir FolderName" were returning the attributes of the current folder, rather than the appropriate directory listings. This bug has been fixed.
The OpenSSL version used by WS_FTP Server has been upgraded from 0.9.8t to 1.0.1c. This upgrade was done to resolve known security issues with the older version of OpenSSL, as well as to add improved functionality that is only available in newer versions of OpenSSL.
CBC mode ciphers can now be disabled across the system by an admin, as this type of cipher has been found to be vulnerable.
If you choose to disable the CBC ciphers, Ipswitch WS_FTP Professional versions before v12.4 will not be able to connect using SSH. Older versions of other FTP clients may also use CBC ciphers.
New installations of the Web Transfer Module and the Ad Hoc Transfer Module will now detect a pre-configured SSL certificate and use that cert instead of creating a new self-signed certificate.
A bug has been fixed that was preventing packages sent via the Ad Hoc Transfer module to be configured with the maximum expiration time allowed. This bug only occurred on systems using Microsoft SQL Server as the back-end database.
A bug has been fixed that was preventing Active Directory users from authenticating to WS_FTP Server when the user's display name within Active Directory contained a comma.
Folder names are modified after adding a user; for example if you have a folder named ABC, once you add a user and save it, the folder name display changes to "abc" in both the WS_FTP Server Manager and on the physical server machine where the folder resides.
A bug has been fixed that was preventing users from logging in when their password contained a backslash.
The LDAP plugin has been updated to support accessing Read-Only Active Directory (RODC) servers. Previous versions of the plugin were incompatible with RODC connections and thus failed to authenticate the user.
A bug has been fixed that caused folder paths entered with a preface of "./" to fail if used with various SSH commands.
The download transfer rate of files from the Ad Hoc Transfer interface has been greatly improved.
When a user renamed a virtual directory via FTP or FTP/SSL, the physical folder pointed to by the virtual directory was being deleted and its contents were being copied to a new physical folder within the location of the user's original virtual directory. This bug has been fixed, so that attempts to rename a virtual directory will only rename that virtual directory and will not result in any files being moved or deleted.
When adding permissions to folders, admins will now be able to search for group names that contain uppercase characters. This bug only affected systems running with a PostgreSQL back-end database.
The utility iftpaddu.exe has been updated to allow both the -e and -n parameters to be specified at the same time when adding users.
User home folders will no longer be deleted when a user account is deleted via sync in the following scenarios:
The following issue was addressed in V7.5.1.2:
10054 Network Error
Failed to accept client connection: An existing connection was forcibly closed by the remote host.
Users would restart the server service before it started to accept new connections.
The following issues were addressed in V7.5.1:
If the impersonation account is incorrectly configured, the user sees the message "Send files failed - data access error, contact system administrator." If the impersonation account does not have permissions to read and write to the folder where Ad Hoc Transfer packages are stored, the user sees the message "Send files failed - system account error, contact system administrator."
certimport.exe
has been reintroduced in V7.5.1. It can be found in: C:\Program Files\Ipswitch\WS_FTP Server\Utilities
C:\Program Files (x86)\Ipswitch\WS_FTP Server\Utilities
The following issues were addressed in 7.1:
STAT /
commands were issued. This has been addressed.The following issues were addressed in this release:
The workaround requires that you modify your local security policy:
Note: If http://127.0.0.1 has not already been added to the Trusted Sites you will see an error page:
This page can’t be displayed.
Make sure the web address is correct.
Look for the page in your search engine.
Refresh the page in a few minutes.
You will need to add http://127.0.0.1 to the Trusted Sites through the desktop Internet Explorer page. You can also go to Internet Explorer > Internet Options > Security tab > Trusted Sites > Sites and add 127.0.0.1 to the list of trusted websites. For more information, see Adding a website to your browser's Trusted Sites.
The WS_FTP Server 7.5.1 and 7.6 installation programs install a new version of the OpenSSL library. The new version (OpenSSL 0.9.8p for 7.5.1; OpenSSL 1.0.1c for 7.6), is required and gets installed to the installation folder (the default is: C:\Program Files\Ipswitch\WS_FTP Server).
If the installation program finds a version of the library in the Windows system folders, it will stop the installation and ask you to move or rename the library files. If these library files are used by other programs, you want to make sure that you retain a copy of them. We suggest you create a backup in another folder, or rename these files, then remove the files from these locations:
32-bit OS |
64-bit OS |
C:\Windows\libeay32.dll |
C:\Windows\libeay32.dll |
C:\Windows\ssleay32.dll |
C:\Windows\ssleay32.dll |
C:\Windows\system32\libeay32.dll |
C:\Windows\SysWOW64\libeay32.dll |
C:\Windows\system32\ssleay32.dll |
C:\Windows\SysWOW64\ssleay32.dll |
C:\Users\[username]\Windows\libeay32.dll or |
C:\Users\[username]\Windows\libeay32.dll or |
C:\Users\[username]\Windows\ssleay32.dll or |
C:\Users\[username]\Windows\ssleay32.dll or |
When upgrading a WS_FTP Server installation that uses a PostgreSQL database from V7.5 to V7.5.1 or later, you must install Microsoft .NET framework 3.5 or 3.5 SP1 before running the installer to upgrade, otherwise the installer will halt the installation.
When a cluster fails over from node 1 to node 2, the number of failed logon attempts does not carry over to node 2. Therefore, the server does not lock out the user even if the failed logon count is cumulatively greater than the limit set by the IP Lockouts rule since the failed logon count per node is less than the IP Lockout rule allows. Once a user fails a number of logons on a single node equal to the IP Lockouts limit, then the user is locked out.
For example, assume a user account’s IP Lockouts rule is set to blacklist the user after 5 failed attempts. If a user fails to log on 3 times while node 1 is the active node and then the cluster fails over, the user will have to fail 5 more log on attempts on node 2 in order for WS_FTP Server to blacklist the user because the failed attempts do not transfer between nodes.
Currently, there is no work around for this issue.
See IP Lockouts do not carry over failed logon attempts after cluster failover in the Ipswitch Knowledge Base for more information.
When a cluster fails over from node 1 to node 2 while an Ad Hoc Transfer user attempts to send a package from the AHT site, the file transfer fails, the user is logged out, and the browser displays the Microsoft error "Internet Explorer cannot display the webpage." After node 2 becomes the active node, users attempting to log on to the AHT site again receive an error message about an unhandled exception.
To resolve this issue, the user must restart the browser session before logging back onto the site. Then the user can send packages normally.
See An unhandled exception when using AHT and switching nodes after a failed send in the Ipswitch Knowledge Base for more details and the content of the exception.
When a cluster fails over from node 1 to node 2 during an upload, the transfer fails and the file transfer client‘s connection to the cluster drops (the message is "Connection is dead"). The upload does not resume when the user logs back into the server. Although the partially uploaded file is present, it cannot be deleted. This is caused by the share host (Windows UNC or Linux NAS) holding an open handle for node 1 on the partially uploaded file, presumably waiting for the client to (possibly) reconnect. Node 2 cannot modify the file at this time.
Since resuming the transfer is impossible, the user must delete the file and then restart the transfer.
To delete the file, the user must wait a few minutes until the share host releases its hold on the file handle, and then the user can delete the file. ("A few minutes" ranges from about 2 minutes on Windows, up to about 10 minutes on a Linux NAS.)
To delete the file sooner, an administrator can force a failover so that node 1 is active, allowing the user to modify the file again.
See Unable to resume transfer or delete file after failover in the Ipswitch Knowledge Base for more information.
When a cluster fails over from node 1 to node 2 during an upload using the Web Transfer Client, both the browser session and the file transfer fail. When the user logs back in, the upload does not resume. Although the partially uploaded file is present, it cannot be deleted. This is caused by the share host (Windows UNC or Linux NAS) holding an open handle for node 1 on the partially uploaded file. Node 2 cannot modify the file at this time.
Since resuming the transfer is impossible, the user must delete the file and then restart the transfer, or overwrite the file on another upload attempt.
To delete or overwrite the file, the user must wait a few minutes until the share host releases its hold on the file handle, and then the user can delete the file. ("A few minutes" ranges from about 2 minutes on Windows, up to about 10 minutes on a Linux NAS.)
To delete the file sooner, an administrator can force a failover so that node 1 is active, allowing the user to modify files again.
See Unable to delete files in the Web Transfer Client after failover in the Ipswitch Knowledge Base for more information.
If you installed WS_FTP Server 6.x with the default SSL certificate, when you upgrade to WS_FTP Server 7.x, that default certificate is maintained. If you then enable FIPS mode, which requires the use of FIPS-validated ciphers in the certificate, the default certificate will cause a connection error when a user attempts a secure connection. The server log will show the following error:
To work around this issue, you need to use a certificate that uses a FIPS-validated algorithm, such as SHA1. You can select to use your own certificate, or create a new certificate in the WS_FTP Server Manager (from the Home page, select SSL Certificates).
cscript %SystemDrive%\inetpub\AdminScripts\adsutil.vbs set w3svc/AppPools/Enable32bitAppOnWin64 1
After running the command, you must restart IIS.
If you specify a user other than the default user to serve as the run as user on the IIS virtual folder (if you are using Microsoft IIS as your web server), you may get a HTTP 401 error when you attempt to open the WS_FTP Server Manager. If this occurs, you must open the WSFTPSVR
virtual folder in IIS and change the anonymous access user password to match the specified user's password.
By default, the Microsoft SQL Server database will only accept connections coming from the local system. To use a remote notification server, to allow multiple servers to share a data store, or to allow a remote Web Transfer Client connection, you have to enable remote connections.
Microsoft's Knowledge Base (KB) provides the following information on remote connections:
"When you try to connect to an instance of Microsoft SQL Server 2005 from a remote computer, you may receive an error message. This problem may occur when you use any program to connect to SQL Server. For example, you receive the following error message when you use the SQLCMD utility to connect to SQL Server:
Sqlcmd: Error: Microsoft SQL Native Client: An error has occurred while establishing a connection to the server. When connecting to SQL Server 2005, this failure may be caused by the fact that under the default settings SQL Server does not allow remote connections.This problem may occur when SQL Server 2005 is not configured to accept remote connections. By default, SQL Server 2005 Express Edition and SQL Server 2005 Developer Edition do not allow remote connections.
For instructions, see the Microsoft KB article: How to Configure SQL Server 2005 to Allow Remote Connections
net.exe
has been removed from the computer on which you want to install WS_FTP Server, you must create a user account to serve as the WS_FTP Server account in Windows before installing. The account name must begin with IPS_
, and it is recommended that it be configured so that the password never expires.During the install, when you reach the Create User Accounts dialog, specify this username without the IPS_
at the beginning.
For example, if you created a Windows user account called IPS_wsftpadmin
, enter wsftpadmin
for the username on the Create User Accounts dialog.
Note: If you are upgrading a previous version of WS_FTP Server with hosts that use Windows NT user databases exclusively, the username you create must be IPS_
plus the username of an existing Windows NT user that has system administrator privileges in WS_FTP Server.
When multiple hosts with firewall settings configured share a single listener, the firewall settings for the first of those hosts that a user logs into are applied to all of the hosts that share the listener and have firewall settings configured. Hosts that do not have firewall settings configured are not effected by this issue. We recommend that all hosts that are assigned to a common listener share the same firewall settings.
The User Configuration Data Exists screen presents options for removing the configuration database:
If you want to maintain the configuration data in the database, for example when you plan to upgrade or migrate to another database, make sure that these options are not selected.
For more assistance with WS_FTP Server, consult the following resources:
Whether you purchased the WS_FTP Server Web Transfer Client as an add-on to WS_FTP Server or WS_FTP Server with SSH, or you received it with your WS_FTP Server Corporate purchase, you need to run the WS_FTP Server Web Transfer Client installation program. For system requirements, installation procedure, and release notes, go to Installing and Configuring the WS_FTP Server Web Transfer Client.
The Ad Hoc Transfer Module is installed separately from WS_FTP Server. For system requirements, installation procedure, and release notes, go to Installing and Configuring the Ad Hoc Transfer Module.