TCP File Transfer

Port 990 (FTPS Control)

Learn about port 990 (FTPS Control) - security risks, vulnerabilities, and common uses. Find devices with port 990 open.

Quick Info

Port Number
990
Protocol
TCP
Service
FTPS Control
IANA Name
FTPS Control

Service Description

Port 990 (TCP) is conventionally used for FTPS (FTP Secure) control connections when using implicit TLS/SSL encryption. Unlike explicit FTPS (using STARTTLS on port 21), implicit FTPS initiates the TLS/SSL handshake immediately upon connection to port 990. This means that the entire control channel, including usernames, passwords, and file transfer commands, is encrypted from the start. The FTPS protocol itself is an extension of the standard FTP protocol, adding TLS/SSL security to the communication. The client connects to port 990, and the server immediately presents its TLS certificate. The client verifies the certificate, and a secure session is established. All subsequent control communication between the client and server occurs over this encrypted channel.

The history of FTPS on port 990 stems from the need to secure FTP communication, especially for sensitive data transfers. While explicit FTPS (STARTTLS) gained wider adoption due to its flexibility and compatibility with existing FTP infrastructure, implicit FTPS on port 990 offered a simpler initial setup for secure connections. The technical details involve the client-server negotiation of TLS/SSL parameters, including cipher suites, key exchange algorithms, and authentication mechanisms. Once the secure channel is established, the FTP protocol operates within the encrypted tunnel, protecting the data from eavesdropping and man-in-the-middle attacks. Data connections for file transfers can be handled in either active or passive mode, with the data also being encrypted over a separate port (usually port 989 for implicit FTPS data connections).

## Firewall Recommendations

If FTPS is required, allowing port 990 is necessary for implicit TLS/SSL connections. However, it is crucial to implement robust security measures. Block the port if FTPS is not in use. When allowing it, ensure the FTPS server is configured with strong TLS/SSL settings, including disabling weak ciphers and requiring valid client certificates for authentication. Regularly update the FTP server software to patch any known vulnerabilities. Implement strong password policies to prevent brute-force attacks. Monitor the port for suspicious activity, such as unusual connection patterns or failed login attempts. Consider using an intrusion detection system (IDS) to detect and prevent attacks. Properly configure firewalls to restrict access to the FTPS server to only authorized IP addresses or networks. Regularly audit the FTPS server configuration to ensure it adheres to security best practices.

Security Information

While FTPS on port 990 provides encryption, it is not immune to security risks. Weak TLS/SSL configurations, such as using outdated cipher suites or allowing anonymous TLS connections, can make the connection vulnerable to downgrade attacks or man-in-the-middle attacks. Certificate validation is crucial; failing to verify the server's certificate allows attackers to impersonate the server. Vulnerabilities in the FTP server software itself can also be exploited, regardless of the encryption. Brute-force attacks on user credentials are still possible, even with encryption, if weak passwords are used. Furthermore, misconfiguration of firewall rules could expose the server to unauthorized access. Attackers might target this port to intercept credentials, gain unauthorized access to files, or use the server as a stepping stone for further attacks within the network.

Known Vulnerabilities

CVE Name Severity Description
CVE-2017-1000247 vsftpd Backdoor Command Execution Critical vsftpd версий 2.3.4 и более ранних содержат бэкдор, который может позволить злоумышленнику выполнить произвольные команды на сервере, если имя пользователя начинается с ':'. Этот бэкдор активируется при установлении соединения с сервером.
CVE-2019-13118 ProFTPD mod_copy Command Injection High ProFTPD версий до 1.3.6 содержит уязвимость в mod_copy, позволяющую злоумышленнику выполнить произвольные команды на сервере через специально созданный запрос SITE CPFR/CPTO.

Common Software

  • FileZilla Server
  • vsftpd (с настройками SSL/TLS)
  • ProFTPD (с настройками SSL/TLS)
  • GlobalSCAPE EFT Server
  • CompleteFTP
  • CrushFTP
  • Titan FTP Server
  • Serv-U FTP Server

Find devices with this port

Discover all devices with port 990 open in any country.

Search Port 990

Find all devices with port 990 open

ScaniteX scans millions of IPs to find devices with specific ports open. Perfect for security research and network auditing.

Start Mass Scanning