YOU SAID:
clients have the ability to tell the server to attack a well known service on any machine. To avoid such bounce attacks, it is suggested that servers not open data connections to TCP ports less than 1024. If a server receives a PORT command containing a TCP port number less than 1024, the suggested response is 504 (defined as "Command not implemented for that parameter" by [PR85]). Note that this still leaves non-well known servers (those running on ports greater than 1023) vulnerable to bounce attacks. Several proposals (e.g., [AOM98] and [Pis94]) provide a mechanism that would allow data connections to be made using a transport protocol other than TCP. Similar precautions should be taken to protect well known services when using these protocols. Also note that the bounce attack generally requires that a perpetrator be able to upload a file to an FTP server and later download it to the service being attacked. Using proper file protections will prevent this behavior. However, attackers can also attack services by sending random data from a remote FTP server which may cause problems for some services.
INTO JAPANESE
クライアントは、サーバーが任意のコンピューター上の既知のサービスを攻撃する能力を持っています。 このようなバウンス攻撃を避けるためには、サーバー開けなかったことデータ接続に TCP ポート 1024 未満をお勧めします。 サーバーは、TCP ポートを含むポート コマンドを受信した場合 1024 未満の番号、応答を示唆されたが ("Com として定義されている 504
BACK INTO ENGLISH
Client has the ability to attack well-known computer on any given server services. TCP port less than 1024 is recommended that server cannot be opened to avoid attacks such as bounce data connection. The server TCP port included
INTO JAPANESE
クライアントは、特定のサーバーのサービスをよく知られているコンピューターを攻撃する能力を持っています。TCP ポート未満をバウンス データ接続などの攻撃を避けるためにそのサーバーを開くことができませんは、1024 を使用することをお勧めします。サーバーの TCP ポートが含まれています。
This is a real translation party!