I have ubuntu server 9.10 running in which I selected the option to automatically installed security updates. It's been running file for 4 months with both ssh and SFTP, which I installed the openssh-server.Today I really need to upload something to the server, which is in another city and SFTP isn't working. It's not allowing me to connected, I tried connecting with multiple FTP clients, command line...etc and on both windows and linux and SFTP just isn't working.The only changed I've done to the configuration file was changing the port from 22 to another port and did this 4 months ago. Been using it every few weeks since then.
I'm trying to get ChrootDirectory working with SFTP. I understand the chroot directory is not writable by the user, so I have to create a sub-directory the user is supposed to write to. I keeping getting write permission denied when uploading a file to this sub directory? how to troubleshoot this or know what i'm doing wrong? Here's how I have it setup.
Fedora 15, OpenSSH 5.6p1
/etc/ssh/sshd_config looks like this
Code:
Subsystem sftp internal-sftp Match Group sftp ChrootDirectory %h
[code]...
I created the sftp group and created a test user.
Code:
groupadd sftp useradd -g sftp -s /bin/false -d /home/test test
Then gave root access to the test user's home directory so chroot will work.
Code:
chown root:root /home/test chmod 755 /home/test
Since the user's home directory is the chroot directory, the user will not have write access to it. So I created a sub-directory that the user will have write access to.
I`ve the following internet configuration at home -
WORLD to ADSL modem in BRIDGE mode with DHCP
[code]....
All internet browsing function are ok, but when I try to upload file using sftp to a remote compute - it hangs. This is not a problem of remote computer. Download is working ok. I disabled firewall on wireless router but this did not help.
As a Windows user, I generated a pair of DSA keys from CoreFTP Lite and sent it to a third party that runs an SFTP server. They told me that a valid DSA key needs to have ssh-dsa at the start and the username@systemname at the end. CoreFTP generated neither the ssh-dsa header nor the username@systemname footer. I tried with WinSCP and it didn't generate them either. Is there a difference between how SFTP works between Windows and Linux? If I put a useraccount@systemname at the end of the text will it work? How would the Linux system validate that my system is called "systemname"? If it can't validate, what is the purpose of adding it?
I've been administrating a dedicated Linux CentOS 5 (Linux 2.6.26.5-rootserver-20080917a) server for around 2 years, and although not a network or Linux expert, been learning to configure as need arises. Primarily using Plesk for day-to-day, but occasionally using Putty to SSH into server.
For all the time I've had the server, I've been connecting to my server via sFTP using "root" password. ( Although, I know this is really bad practice, I assume made safer by connecting with SSH FTP)
After spending another normal day in the office developing websites, connecting to my server as root using SFTP in Filezilla AND Dreamweaver I left for the night.
Returned next morning, after having done no manual updates or amends to my server; I could no longer SFTP into my server?
Thought it may be related to my office network, so tried it from home over the weekend, same result; can no longer connect SFTP for root?
I can connect to the server via Putty using my "root" username and password.
After spending hours looking on the internet for a solution, I'm lost for ideas as I didn't make any changes?
What happens when I open my Filezilla and try connecting as SFTP is it states:
Error:Connection timed out Error:Could not connect to server
I checked server log /var/log/secure and it states:
Accepted password for root from UNKNOWN port 49212 ssh2 Apr 9 07:41:41 s15320264 sshd[7122]: fatal: Write failed: Connection reset by peer
Odd part is, it's worked fine for weeks, months without ever failing to connect?
Also, notice that Putty connection seems to take much longer to authenticate root user than it used to?
Checked via Plesk Health Monitoring and all CPU, Memory and Disk Levels are well below any alarm levels.
I have run all Plesk updates to 10.2.0 in the hope that it resolved it, but to no avail.
Weird problem; I have set up SSH on my 10.04 server. I can putty to it over my LAN from my Win 7 box but when I try to SFTP I get "connection timed out".
I have configured the sftp in ubuntu 9.10, I could able to connect through the port 22, but not connected to users home folder. where do I need to configure so that users can connect / restrict to only their folder
The server kicked me out because Dolphin opens many many connections wile browsing through the servers filesystem with dolphin. i have to wait several minutes to be able to upload files after the limit reached. i am using kubuntu 10.04
I've made an SSH server using OpenSSH on my desktop Ubuntu (10.4) for tunneling. However, I'm noticing that the public account I made for my SSH (one to give to friends to use proxy) has SFTP access to crucial system files. I'm okay with SFTP being enabled on my account, but not on this public account. Does anyone know of anyway to either disable SFTP to that user, or restrict access to important files?
I'm writing a file handler script that monitors (via a cron job) a directory that is an openssh sftp target for new files. When it detects a new file, it moves it, does an scp to another system, and sends an email. The problem I have is that I can't figure out a way to verify that the sftp upload is complete before I start manipulating the file.
I'm trying to establish a connection between two laptops using sftp but am getting the following error message:
Connecting to <IP>... ssh: connect to host <IP> port 22: Connection refused Couldn't read packet: Connection reset by peer
ftp isn't working either. Both machines are running Ubuntu and connect to the internet through the same wifi router in case that's relevant. What could be the problem?
I'm using Ubuntu Server 10.04 and I'm also using OpenSSH 5.3. I have SFTP-only users in a chrooted environment. Users are able to login, change directories, upload and download files, but as soon they attempt to give the 'ls' or any list directory. the server disconnects.
I can't connect to sourceforge with SFTP from filezilla. I'm using the correct username [URL].. and password (Same one as allows me to login to web administration) so why do I keep getting "Authentication failed; Critical error"
I'm using Filezilla to connect to a remote server with site 2 site VPN. Even when i'm sending a small file with SFTP, the connection time outs and reconnects. Its happening again and again. Even SCP connection is also the same. BUT SSH CONNECTION IS WORKING FINE.
Filezilla log
ravindika@ravindika:~$ tail -f filezilla.log 2010-07-07 10:35:12 2690 2 Response: fzSftp started 2010-07-07 10:35:12 2690 2 Command: open "root@XXX.XXX.XXX.XXX" 22 2010-07-07 10:35:19 2690 2 Command: Trust new Hostkey: Once 2010-07-07 10:35:21 2690 2 Command: Pass: ******* 2010-07-07 10:35:25 2690 2 Status: Connected to XXX.XXX.XXX.XXX
I'm currently searching for a good ftp storage (with sftp supported) to back up my stuff. I had a look at amazon's S3. That looks good, but maybe a bit pricey. Do you guys have any ideas?
I'm wanting to setup SFTP in a chroot, which is simply enough to do and I already have it working; however I also want it so that when they connect via SFTP it goes directly to their home directory. Currently I have the following in "/etc/ssh/sshd_config":
Code:
Subsystem sftp internal-sftp Match Group sftp-users ChrootDirectory /home AllowTCPForwarding no ForceCommand internal-sftp
Which works perfectly fine, however when they connect there are shown the contents of the "/home" directory which they then have to "cd username" to get to their home directory. This I do not like, and it confuses our clients who connect saying they can see "random folders that aren't mine", or some that think they've "hacked" the server. I really need it so upon connection they go to "username" directory. I can do this by using:
Code:
usermod -d /username username
Which changes the users home directory to "/username", and then upon connection it works just fine, they are taken directory to their home directory. However, I really really do not like the fact that "/etc/passwd" shows a different home directory to their real home directory, i.e it states "/username" when actually it is "/home/username".I've spent the entire day looking a different ways of doing it, and I can't come up with anything.
I have recently configured sshd_config to have chrooted SFTP service. I'm using SFTP internal-sftp config. However now I have to figure out how to log file transfers happening using the SFTP service. I'm using the Ubuntu Server 10.04 (64bit)
I have a openSSH server, it works to connect to it within the local network but I can't connect to it from the Internet. What I would like to do is to connect to the server using filezilla client, simply by using username and password.To make it secure from brute force attacks will I only allow connections from specific IP number.
I have a server with the static internal ip 192.168.1.5, port is 2222. My global ip is 10.4.5.6 and I would like to connect with filezilla client from ip 11.1.2.3. How do I connect?
I'm running Ubuntu 10.04 LTS Using sftp, is there any way to force particular file permissions upon upload? I want the permissions on all files uploaded via sftp to be 664.
I've searched around and cannot find an answer. Many people ask similar questions and many responses recommend using umask, but as far as I understand it, umask is just a bit mask--it cannot be used to set permissions.
I recently set up SFTP on my server and in doing so wanted to create a jail for users. I went through the steps and edited the sshd_config accordingly and got everything to work perfectly. However since doing so I can no longer ssh to that machine as I once was able to do. SFTP and the jail work fine however if I comment out ChrootDirectory /home/%u and ForceCommand internal-sftp in the sshd_config; I can now ssh to that machine however the jail no longer works. I need to be able to have the jail working properly for SFTP along with being able to ssh to that machine. Is this possiblesshd_config: Jail works for SFTP but no ssh
# Package generated configuration file # See the sshd( manpage for details # What ports, IPs and protocols we listen for
I really hope someone could help me with this problem. I've been stuck on this for a month.I am using the sftp command to upload files using a bash script.The problem is that it is extremely slow to do it this way. as many of you would know if you have shared server somewhere. I would use scp if remote server supported it, but it doesn't.
Anyway, If any of you have ever used FileZilla, in the Settings, if you go to "Transfers" there is a place where you can set the number of "maximum simultaneous transfers". This feature works wonders with SFTP (and FTP too). It really speeds things up. How do I accomplish this same thing with the sftp command... because I don't want to use a GUI. I don't even mind using FileZilla through the command line if possible... but it does not seem to be possible. I've been stuck on this for a month!!! I've searched everywhere and tried a lot of things with no avail...
I want to use a cron job to backup my files to my server. Now when I run the script manually, I get an error when backing up (something and sftp file being used or so). I only get this when I'm simultaneously connected to my server with sftp. So to be sure that this doesnt happen when I wont be there anymore to look at the log, I would like to know if there is a command to kill all sftp connections. I would put this command in the backup scrip cron uses.
I am trying to use autoexpect and can't seem to get it working. I installed expect and expect-dev and have the autoexpect example files but when I try the % autoexpect command from the terminal all I get is;"bash: fg: %: no such job" - what do I need to do so I can get this to work? I am trying to create a script for an automated SFTP connection. I created a bash script that works okay but it gets stuck at the password prompt and I heard that autoexpect would be the best way around that
I have set up a local server for testing on my home network and installed openSSH. I can login using filezilla and SFTP and can even download files. Error messages saying cannot find directory (the directory I am trying to upload)?
Do I need to configure openSSH to allow this. I am using my usual ubuntu login. Maybe I need to set up another user for SFTP.
On my Ubuntu 8.04.4 LTS webserver I desperately want to disable the Root account. But at the moment I am unable because I prefer to use Nautilus/Dolphin on my home laptop for SFTP. The graphical interface also helps when comparing multiple config files at once, something that being limited to NANO or PICO would make extremely painful. The problem is that if I don't use ROOT I can't perform any SSH or SFTP actions with a graphical interface, because I can't use SUDO without the terminal. Does anyone else leave root enabled? I have a non-standard port, disabled password authentication in favor of ssh keys, and I have a tarpit configured
I want to connect to the same machine that that I have OpenSSH server on which uses keys and I have disabled password-based logins (for ssh). Apparently, this also affects SFTP which makes sense. How do I setup SFTP to use key-based authentication?