General :: Connect To An SFTP Server From A Windows Machine To A SFTP Server Using A DSA Key?
Jul 24, 2011
As a Windows user, I generated a pair of DSA keys from CoreFTP Lite and sent it to a third party that runs an SFTP server. They told me that a valid DSA key needs to have ssh-dsa at the start and the username@systemname at the end. CoreFTP generated neither the ssh-dsa header nor the username@systemname footer. I tried with WinSCP and it didn't generate them either. Is there a difference between how SFTP works between Windows and Linux? If I put a useraccount@systemname at the end of the text will it work? How would the Linux system validate that my system is called "systemname"? If it can't validate, what is the purpose of adding it?
I am configure one sftp server(openssh) in my linux server. Its working fine. but when i try to connect its shows all folders like root, boot. but i need particular folder only. how to do this. I am using centos5.2
I have an account in university on Linux machine with 10TB of free space accessible via SFTP. I would like to backup my Windows 7 x64 laptop to university. Currently I am using rsync+cygwin, but backup is pretty slow (without shadow copy) and I hate console window appearing every day on my screen when I login.
So I am looking for something like Windows Backup but with support for SFTP. Combination of tools will work too.
I have done a minimal install of jessie stable on a 2004 laptop with openbox as the window manager. My problem is the nautilus connect-to-server returns "This file server type is not recognized" when entering sftp: or ssh: I have also tried installing Thunar with the same result. I can use cli and connect using both sftp and ssh.
I have FileZilla installed on this machine, and OpenSSH (with an open port 22) on another machine on my home network. When I try and connect, I get: Quote: Status:Connecting to 192.168.2.3... Response:fzSftp started Command: open "alphatwo@192.168.2.3" 22 Error:Connection refused Error:Could not connect to server
Which has left me puzzled as I have an open port. Does the username have to be defined somewhere? E.g. the machine acting as my SFTP server can be logged on to locally as alphatwo so that's what I logged in as (with the correct password). Is this correct? If so, does anyone have any ideas as to how I might rectify it? I want SFTP set up so I can copy PHP files from my laptop to /var/www/html/ on another PC (across the home network).
I can't sftp directly into a particular host. To move a file from my home machine to the host, I must sftp a file to an intermediate host; ssh into the intermediate host; and sftp the file to the final destination. Is it possible to avoid such madness?
I am using Ubuntu 9.10 to configure telecom equipments. The software downloading process to the equipment requires that my Ubuntu laptop should act as a SFTP server where the software bundle for the equipment is stored. The equipment act as a SFTP client and requests the software from the server. The equipment have SFTP client hardwired in its memory. The same process i did with windows and i used Putty and FreeFtpD and it worked. Now i want to move to Ubuntu as i want to show that it is better. I have installed OpenSSH server in my laptop and now i need to know few things that i could not find anywhere straight forword.
1)I am using a ubuntu live usb drive with persistancy. How do i set username and password for the client, that is how to create the account in OpenSSH server?
2)I need to keep the software for the equipment in a folder inside server, so that it can be transferred to client upon request. In windows I give the path of the folder to FreeFtpD server. How to do the same in OpenSSH server?
Setting up servers and clients in linux is completely new for me.If this is done (as i know it can be but dont know how) then i can completely move from windows to Ubuntu environment.
I had an ftp server about a year ago. It was running off of windows 2003, and didnt have any protection on it besides the normal firewall and NAT router. I shut it down after a couple weeks because i was constantly getting password hackers and weird things trying to break inused Ethereal to monitor packet traffic).Anyway, ive decided to take another swing at it and try to configure a more secure server on a more secure OS. I've found multiple HOWTO guides by surfing google BUT most/all of them want me to download a file called "openssh-4.5p1-chroot.tar.bz2", however the address they all point to does not exist! That address is so my main questions are where can i find this file? Is there a better one that would work? Is there a tutorial someone knows about that would get me past this?
I built a computer last week for this purpose (only had to buy a few parts so it's not like i spent $500), and now i feel like ive hit a dead end just cause a site decided to take a file down and no one else has realized it's happened except me.
I have recently configured sshd_config to have chrooted SFTP service. I'm using SFTP internal-sftp config. However now I have to figure out how to log file transfers happening using the SFTP service. I'm using the Ubuntu Server 10.04 (64bit)
I cannot access a remote server(Ubuntu) using ssh or even using sftp from my ftp client. I've been accessing this server regularly for many months with no problem until now. There is a web server running and that's OK, so no problems there. I asked the owner of the server if he could access using ssh from within his LAN, which he could! So openssl is working from within the LAN, but not ouside of the LAN. I access the remote server by using one of [URL] free domain names. I'm aware that this service requires renewal or activity at least once a month and as far as I know this is up to date and working OK.
Is this a router gateway problem? I suspect that port 22 has been blocked, but what could block this port? It's been working well for so many months. As far as I can tell the owner of the server/LAN has not been tampering with the router, so what could be blocking port22? I'm currently accessing the server using vnc4server.
Another really weird thing is that when I access the terminal on the remote server via vnc4server and I ssh back to the server using one of [URL] free domain names, it works! So as I understand ssh is accessing itself by going out of the LAN and back to itself. This would suggest that port22 on the gateway router is working. But when I try to ssh from a pc outside of the LAN, I just get timed out!
* openssl working from within the LAN but not outside of the LAN. * sftp not working. * domain name from dyndns.com working and up to date. * Web server is working OK.
Running: Red Hat Enterprise Linux Server 5.2 (Tikanga) I need to be able to automate transferring a few files over from one server to another using scp or the sftp protocol. I have received a text file which looks like a key file along with username and passphrase information for the target server in question.
Instructions were given to me to import the provided text file in puttyGen then save the imported key as a private key to be used by scp or sftp. My assumption is this is for windows utilities, which I am not using. My frustration comes in trying to automate logging into this server via sftp or scp to automate some file transfers. I am asked for a password every time because the public and private key methods failed to find my keys. How can I call scp or the sftp utilities and use the provided key file (the one I generated using puttyGen or the original one provided to me) to login to this server? I've tried taking the generated ppk file from puttygen and adding it with the ssh-add command but that still did not work.
I've not been having any luck at all finding the answer to this, so thought I'd ask here: is there any way to get my servers to send an email when someone logs in through SFTP? I was able to get that to work with SSH using a simple bit of script in /etc/profile, but I can't find anything on Google about doing that with SFTP at all.
The OpenSSH version on my server is 5.2p1 running on FreeBSD 8.0. Any way to get the server to execute any command on SFTP login will be enough for me to get this set up.
My website, IsleDiscount.com, is hosted on a virtual server with pair.com. Pair.com offers only one SFTP account on regular shared server and to set up mutltiple SFTP accounts, Pair.com moved me to a virtual server (VQS1), which I believe is not a shared server solution, but Pair representatives were able to create multiple SFTP accounts on this VQS server.
However, when I asked the representative to restrict access of this additional SFTP accounts to a sub-folder, I got the following warning email: confirm you understand this will make your entire web directory world-writeable. This will increase the chances of a security attack. If you do understand this, you can go ahead and execute the command yourself. The command below will accomplish both commands in one.
I have recently discovered the following: when I attempt to connect to any of our machines that are OpenSSH 5.x (Ubuntu 10 or OpenSuSE 11.x in our case) as one of the users defined in the NIS domain that fails. For instance, me (user bepstein) can SSH into all those machines but not SFTP.I can SFTP into those machines on the network that are OpenSSH 4.x, however (CentOS 5.3 - 5.4, OpenSUSE 10.3).As a user defined locally on the machine (in /etc/passwd ) I can connect via either SSH or SFTP even if the machine is OpenSSH 5.x.Some further discussion of that issue is available here: http:[url]....
I just installed Wordpress and i am delighted of it, nice peace of software. Even so I have to get running a FTP or SFTP server on my localhost machine. I did installed in my Ubuntu 10.10 the VSFTPD server and generated a RSA certificate file (vsftpd.pem). Strange it is that there is no vsftpd folder under /etc, instead vsftpd.conf file is directly into /etc ... so I have generated also my .pem file into /etc. Anyway I have a lot of trouble adding new users to access this server. I use Filezilla as SFTP client. Please let me know if you encountered such an issue, and what is the solution for it. Downwards is my vsftpd.conf file.
# Example config file /etc/vsftpd.conf # # The default compiled in settings are fairly paranoid. This sample file # loosens things up a bit, to make the ftp daemon more usable.
I set up my vsftpd server, but when using "sftp servername" it's not using vsftpd but another (what seems like) built-in sftp server. Even when I stop the vsftpd service I am still able to get a prompt to log in. I haven't installed any other ftp servers.
I forwarded my port 22 so i can access my ssh console on my mac or Windows (using ssh secure shell client for Windows by the company SSH). On Windows i can transfer the files no problem. Now on my mac's Finder ( that supports sftp natively ) i can't access the sftp is any configuration i need to make?
I'm running an SFPT server which my clients logon to using an FTP client. at the moment each client has a user name and password.
Thus far to improve security I've disabled root login but an looking for futrhrt ways to protect it from attack, having researched using google some of the security features suggested prevent the FPT clients from connecting.
Questions: 1- what further things can i do to secure my server that still allows it to be usable for FTP clients? 2- specifically is it possible to use non login pre-share key authentication?
If one uses a free ftp account to store private data such as bookmarks, they might prevent any eavesdropping by using ssh for the transfer (ftps), or alternatively sftp.
However, they would still have to trust the ftp hosting provider, because the data is stored unencrypted in the server.
Someone suggested putting all bookmarks in a small truecrypt volume instead and synchronizing this with the ftp server.
Performance issues aside, given that the plaintext only changes a little in each resync (only a bookmark is added usually), is the use of the truecrypt volume introducing a means for an eavesdropper to break the code?
Using CentOS 5.5. I have a handful of users that I need to have connect to my server via sftp and start in the same directory. for example, user1, user2, user3, etc.. will connect via sftp and upon connection will all be in the /some/dir/path/ftp-root directory.I know one way is to create these users all with the same 'home' directory, since by default a user starts in their home directory when connecting via sftp, but before just doing that, I wanted to find out if that is really the appropriate method to use? alternatives? Is there some setting on the sftp server end that could direct all users to one starting directory so that these users don't have to have the same 'home' dir? I'm using the sshd daemon that comes with CentOS 5.5 (with all current updates/patches)
I have configured the SFTP Jail for some of the users in my sftp server and which is hosted for my clients.i have one small issues and i need the help from experts. e /../jajil/etc/shadow file. can you please help me how to update the password in /../jail/etc/shadow file instead of updating in /etc/shadow file.