Bug ID 700992: FTP security in PASV mode resets

Last Modified: Sep 13, 2023

Affected Product(s):
BIG-IP ASM(all modules)

Known Affected Versions:
12.1.0, 12.1.1, 12.1.2, 12.1.3, 12.1.3.1, 12.1.3.2, 12.1.3.3, 12.1.3.4, 12.1.3.5, 12.1.3.6, 12.1.3.7, 12.1.4, 12.1.4.1, 12.1.5, 12.1.5.1, 12.1.5.2, 12.1.5.3, 12.1.6, 13.0.0, 13.0.0 HF1, 13.0.0 HF2, 13.0.0 HF3, 13.0.1, 13.1.0, 13.1.0.1, 13.1.0.2, 13.1.0.3, 13.1.0.4, 13.1.0.5, 13.1.0.6, 13.1.0.7, 13.1.0.8, 13.1.1, 13.1.1.2, 13.1.1.3, 13.1.1.4, 13.1.1.5, 13.1.3, 13.1.3.1, 13.1.3.2, 13.1.3.3, 13.1.3.4, 13.1.3.5, 13.1.3.6, 13.1.4, 13.1.4.1, 13.1.5, 13.1.5.1

Opened: Jan 07, 2018

Severity: 4-Minor

Symptoms

In FTP transaction, an unexpected RST arrives

Impact

Unexpected RST.

Conditions

An unknown command is sent after changing to PASV mode. The FTP profile is set to inherit it's parent settings.

Workaround

The issue seems to reproduce only when the FTP profile inherits it's parent settings: ltm profile ftp /Common/another_ftp_sec_prof { app-service none defaults-from /Common/ftp inherit-parent-profile enabled security enabled } when the "inherit-parent-profile" is disabled, the issue is not happening.

Fix Information

None

Behavior Change

Guides & references

K10134038: F5 Bug Tracker Filter Names and Tips