Hello everyone,
I guess sftp is too nice to keystroke attacks:
sftp> rm *
\337\337\337\337\337\337\337\337\337\337\337\337\337\337\337\337\337<--
visual feeback not needed
0%0 1.1MB/s 00:08 ETA <-- visual feeback not needed
[file list]
Let me know what do you think
v6 makes the internet more efficient at sending data from point
> > A to point B, thanks to its streamlined packet handling and routing
> > capabilities"
> >
> > What a load of bollocks. This is not somewhere to take advice from.
> >
> >
> > --
> >
On Fri, Nov 15, 2024 at 12:45 AM Kirill A. Korinsky wrote:
>
> On Thu, 14 Nov 2024 03:04:41 +0100,
> Aaron Mason wrote:
> >
> > I heard these articles may be written by AI. QuillBot says 82% likely
> > for the SFTP article.
> >
>
> If you read this a
On Fri, Nov 15, 2024 at 1:36 AM Kevin Chadwick wrote:
>
> 14 Nov 2024 02:07:02 Aaron Mason :
>
> > I heard these articles may be written by AI. QuillBot says 82% likely
> > for the SFTP article.
>
> hmmm, What happens when the next generation of "A.I"
14 Nov 2024 02:07:02 Aaron Mason :
> I heard these articles may be written by AI. QuillBot says 82% likely
> for the SFTP article.
hmmm, What happens when the next generation of "A.I" trains on the previous
generations nonsense. Or do they analyse and ignore their own nonsense, lol.
On Thu, 14 Nov 2024 03:04:41 +0100,
Aaron Mason wrote:
>
> I heard these articles may be written by AI. QuillBot says 82% likely
> for the SFTP article.
>
If you read this article https://ipv6.rs/tutorial/OpenBSD/DragonFly/ you'll
be sure that it was made by some kind
g and routing
> capabilities"
>
> What a load of bollocks. This is not somewhere to take advice from.
>
>
> --
> Please keep replies on the mailing list.
>
I heard these articles may be written by AI. QuillBot says 82% likely
for the SFTP article.
--
Aaron Mason - Programmer, open source addict
I've taken my software vows - for beta or for worse
On 11/12/24 11:36, Stuart Henderson wrote:
Following this guide.
https://ipv6.rs/tutorial/OpenBSD/OpenSSH_SFTP_server/
"OpenBSD comes with an OpenSSH server installed by default, but it may
not be the latest version. To install the latest version of OpenSSH, run
the following command: $ sudo
>> Following this guide.
>> https://ipv6.rs/tutorial/OpenBSD/OpenSSH_SFTP_server/
"OpenBSD comes with an OpenSSH server installed by default, but it may
not be the latest version. To install the latest version of OpenSSH, run
the following command: $ sudo pkg_add openssh"
er wat?!
but then els
you are confusing "simple file transfer protocol" (SFTP, RFC913; Port
115, which is obsolete btw), with "ssh file transfer protocol" (SFTP,
Port 22, man(1) sftp)
On 12.11.24 09:01, Richard Bostrom wrote:
Distinguished Gentlemen.
Please.
SFTP works out of the box with the i
Den tis 12 nov. 2024 kl 09:05 skrev Richard Bostrom
:
> However SFTP runs on port 115 according to /etc/services
> However SFTP only works on port 22 which is also the ssh port
Not the same.
--
May the most significant bit of your life be positive.
Distinguished Gentlemen.
Please.
SFTP works out of the box with the installation settings from the OpenBSD
installer.
Following this guide.
https://ipv6.rs/tutorial/OpenBSD/OpenSSH_SFTP_server/
However SFTP runs on port 115 according to /etc/services
However SFTP only works on port 22 which is
On Tue, 26 Mar 2024 10:28:11 +0100
Sylvain Saboua wrote:
> Match User media
> ForceCommand internal-sftp -d /home/media
> ChrootDirectory /home/media
> PasswordAuthentication yes
> AuthenticationMethods none
> PermitEmptyPasswords
On Tue, 26 Mar 2024 at 23:49, Sylvain Saboua wrote:
[...]
> /bin/true is not in the /etc/shells file on my system.
> Did you suggest I should add it ?
I did suggest that as a possible resolution to your problem. Since
your problem is now resolved, I wouldn't change it.
--
Darren Tucker (dtucke
24-03-26 13:26, Darren Tucker a écrit :
You could run sshd in debug mode to be sure ("/usr/sbin/sshd -ddd -p
", then connect with "sftp -oport="), but...
On Tue, 26 Mar 2024 at 22:10, Sylvain Saboua
wrote:
[...]
# useradd -g media -s /sbin/nologin -u 2000 -v media
Sylvain Saboua writes:
[...]
> $ more /etc/ssh/sshd_config # relevant extracts and changes :
> ...
> PermitRootLogin no
> ...
> # override default of no subsystems
> #Subsystem sftp /usr/libexec/sftp-server -d /home/media
> Subsystem sftp internal-sftp # -d
You could run sshd in debug mode to be sure ("/usr/sbin/sshd -ddd -p
", then connect with "sftp -oport="), but...
On Tue, 26 Mar 2024 at 22:10, Sylvain Saboua wrote:
[...]
> # useradd -g media -s /sbin/nologin -u 2000 -v media
Unless /sbin/nologin is in /etc/sh
$ more /etc/ssh/sshd_config # relevant extracts and changes :
...
PermitRootLogin no
...
# override default of no subsystems
#Subsystem sftp/usr/libexec/sftp-server -d /home/media
Subsystem sftp internal-sftp # -d /home/media
Match User media
ForceCommand internal-sftp -d /home
2023-08-31 (Thu) 16:29 UTC -0500 :
> I am setting an openbsd 7.3 stable system to serve files via ssh's sftp
> subsystem.
>
> Does openssh have a native way to audit what files were
> downloaded/uploaded with user/timestamp information?
>
> If not, are there any recom
Copy.. ;)
Stuart Longland VK4MSL wrote:
> On 28/9/23 18:29, Daniele B. wrote:
> > Any more update?
> >
> > Beside FTPD having instead vsftpd like the ftp man one
>
> sftp ≠ ftp/ftps
>
> FTP is the original File Transfer Protocol, introduced in
On 28/9/23 18:29, Daniele B. wrote:
Any more update?
Beside FTPD having instead vsftpd like the ftp man one
sftp ≠ ftp/ftps
FTP is the original File Transfer Protocol, introduced in 1971 and
described in RFC-959.
FTPS is FTP run over TLS.
SFTP is a file transfer subsystem run over SSH
On 2023-09-28, Nick Holland wrote:
> On 8/31/23 17:29, myml...@gmx.com wrote:
>> Hi All,
>>
>> I am setting an openbsd 7.3 stable system to serve files via ssh's sftp
>> subsystem.
>>
>> Does openssh have a native way to audit what files wer
On 8/31/23 17:29, myml...@gmx.com wrote:
Hi All,
I am setting an openbsd 7.3 stable system to serve files via ssh's sftp
subsystem.
Does openssh have a native way to audit what files were
downloaded/uploaded with user/timestamp information?
If not, are there any recommendations?
Than
dable, however. The default location for this style of log file is
/var/log/xferlog, but you may change it with the setting xferlog_file.
Default: NO
-- Daniele Bonini
"myml...@gmx.com" wrote:
> Hi All,
>
> I am setting an openbsd 7.3 stable system to serve files via ssh'
Hi All,
I am setting an openbsd 7.3 stable system to serve files via ssh's sftp
subsystem.
Does openssh have a native way to audit what files were
downloaded/uploaded with user/timestamp information?
If not, are there any recommendations?
Thanks in advance.
Stuart Henderson :
> Do you have the correct directory?
>
> The user's home directory is appended to ChrootDirectory. e.g. in your example
> something like /home/of/the/hackers/home/myftpuser.
Super good, now I'm also chrooted..
Thanks a lot, Stuart!
-- Daniele Bonini
On 2023-03-09, Daniele Bonini wrote:
> I configured sshd to chroot ftp requests in this way:
>
> Match User myftpuser
> ChrootDirectory /home/of/the/hackers
> ForceCommand internal-sftp
>
> giving the proper permissions to the destination dir, etc.
> as from Pet
> let's remain on sftp topic..
I finally managed to receive the proper answers from my hosting
that permitted me change sshd port successfully.
On the other hand I came across some Linoox doc about how-to produce
a chroot ssh environment to make the sshd_config settings meaningful and
at having a non-standard port number for
SSH/SFTP is that the noise generated by the script kiddies banging on
port 22 and not trying other port numbers is reduced.
It most definitely does not make anything more secure as a port scan
will soon tell an attacker where to try next. It'll
Here I am with one more trouble..
(I'm still waiting proper reply from the hosting for the change of
sshd port and the related consequences to the VPS console but let's
remain on sftp topic..)
I configured sshd to chroot ftp requests in this way:
Match User myftpuser
Chroo
Peter N. M. Hansteen :
>
> That little guide I posted a link to has a section about setting up
> a separate set of users for sftp
Thank you for your answers and the doc too, Peter.
While I'm reading you I'm trying to grasp from my hosting what are they
enforcing
under
able to connect.
That little guide I posted a link to has a section about setting up
a separate set of users for sftp. For other use, you would likely
be better off with a normal shell.
something like keep your normal user (guessing 'daniele'), and
in addition define 'sftp-daniel
cor...@free.fr wrote:
>
> Since sftp uses ssh port, you can just change the port for sshd.
> in sshd_config:
>
> Port 22
>
> change it to any number you want.
VPS here come in a nice package with a default web console over ssh.
An other one: if I try to nobody the user
On Thu, Mar 09, 2023 at 12:47:14PM +0100, Daniele Bonini wrote:
>
> I'm wondering if there is any chance to change the default
> listening port for sftp-server.
>
> NB: I'm using it on my Linoox VPS but I see from the man
> a given OpenBSD 2.8 port origin.
it is i
On 09/03/2023 19:47, Daniele Bonini wrote:
Hello,
I'm wondering if there is any chance to change the default
listening port for sftp-server.
NB: I'm using it on my Linoox VPS but I see from the man
a given OpenBSD 2.8 port origin.
Thanks, appreciated!
-- Daniele Bonini
Since
Hello,
I'm wondering if there is any chance to change the default
listening port for sftp-server.
NB: I'm using it on my Linoox VPS but I see from the man
a given OpenBSD 2.8 port origin.
Thanks, appreciated!
-- Daniele Bonini
Dear list,
sorry for the noise, the sftp connection doesn't most probably work due
to a change in the server's settings, and is not OpenBSD related.
It was just a time coincidence of my upgrade and their change.
Best regards
Rudolf Sykora
Rudolf Sykora writes:
> Hello list,
&g
Hello list,
I used to use the 'sftp connection' with mc, it worked, seemingly, until I
upgraded OpenBSD from 6.9 to 7.0. Now it says, when I try to use it:
The requested method(s) are not currently supported (-33)
Does anybody know what could have happened (and whether it is rela
Damien Miller:
> CVSROOT: /cvs
> Module name: src
> Changes by: d...@cvs.openbsd.org2021/08/02 17:38:27
>
> Modified files:
> usr.bin/ssh: scp.1 scp.c
> usr.bin/ssh/scp: Makefile
>
> Log message:
> support for using the SFTP protocol
Am 06.02.2019 um 12:13 schrieb Jiri B:
> Yes, you can but then you cannot use `internal-sftp` because it is
> "internal" sshd process.
> You must populate chroot in your ChrootDirectory, on Linux you also
> need to have /dev/log
> there.
>
> I use this solution t
Yes, you can but then you cannot use `internal-sftp` because it is
"internal" sshd process.
You must populate chroot in your ChrootDirectory, on Linux you also
need to have /dev/log
there.
I use this solution to rsync uploaded files to other host.
Jiri
On Wed, Feb 6, 2019 at 10:49 AM
Hi.
I hope this list is the right one to ask openssh questions, in case I'm wrong
here please point me to the right list/channel, thanks.
We use sftp for uploads and iWatch to post process the uploaded files.
We have several Match blocks in our /etc/ssh/sshd_config
```
Match User us
On Wed, Sep 19, 2018 at 02:59:42PM -0700, Chris Bennett wrote:
> OK, I think I have this right now
>
> Files in /etc/mtree show proper owner:group mode everywhere.
> Files inside of httpd chroot have same as outside.
> Added an sftp chroot directory inside of httpd chroot fo
OK, I think I have this right now
Files in /etc/mtree show proper owner:group mode everywhere.
Files inside of httpd chroot have same as outside.
Added an sftp chroot directory inside of httpd chroot for external user.
Thus they can upload and download, but do the work elsewhere. Nologin.
Right
On Fri, Dec 01, 2017 at 02:59:38AM -0500, Jiri B wrote:
> On Thu, Nov 30, 2017 at 05:36:57PM -0600, Edgar Pettijohn wrote:
> > I was looking into how best to secure a sftp-server. The manual
> > mentions a -Q option to query protocol features supported. I added the
> &
On Thu, Nov 30, 2017 at 05:36:57PM -0600, Edgar Pettijohn wrote:
> I was looking into how best to secure a sftp-server. The manual
> mentions a -Q option to query protocol features supported. I added the
> following line to sshd_config.
>
> Subsystem sftp /usr/libexec/s
I was looking into how best to secure a sftp-server. The manual
mentions a -Q option to query protocol features supported. I added the
following line to sshd_config.
Subsystem sftp/usr/libexec/sftp-server sftp -Q requests
So far I'm not sure how to get at the information provid
thanks for the info, the read only would be rw but it's at least worth
looking at even its hackish :-P
But I also figured, since I dont need a shell for these users I can
simply force them in a sftp chroot somewere else but this is something I
have to refine more though
on my testmach
On 14 June 2017 at 11:33, Markus Rosjat wrote:
> Hi there,
>
> I want to build an sftp environment where the user is chrooted to his home
> dir. So far so good but then again the user might need access to a webserver
> resource like /var/www/htdocs/some_dir
>
> As far as I
Have a look at the book https://www.michaelwlucas.com/tools/relayd
Chapter 7 addresses this exact scenario
On Wed, Jun 14, 2017 at 3:33 AM, Markus Rosjat wrote:
> Hi there,
>
> I want to build an sftp environment where the user is chrooted to his home
> dir. So far so good but th
Am 14.06.2017 um 16:31 schrieb Chris M:
Some hosts chroot users into a specific web dir because they have multiple
vhosts on the same server, and they dont want all sftp or ssh users to be
able to browse into other vhosts, even to look around. They might also want
to give developers access to
Some hosts chroot users into a specific web dir because they have multiple
vhosts on the same server, and they dont want all sftp or ssh users to be
able to browse into other vhosts, even to look around. They might also want
to give developers access to specific subdirs without seeing the entire
> instead
> >> of mounting twice the mountpoint. FreeBSD has mount_nullfs to do
> exactly
> >> the same thing as --bind, but OpenBSD doesn't have any of this.
> >
> > Do you build a shell server or you just want to give SFTP access
> > to users' web
t;>
> >>> On linux you should use mount --bind to bind a folder on another
> instead
> >>> of mounting twice the mountpoint. FreeBSD has mount_nullfs to do
> exactly
> >>> the same thing as --bind, but OpenBSD doesn't have any of this.
> >>
OpenBSD doesn't have any of this.
Do you build a shell server or you just want to give SFTP access
to users' web data?
If the latter, why don't you just chroot them directly into their
user dir inside web root? Or, just define their home to be inside
web chroot...
j.
like I st
u build a shell server or you just want to give SFTP access
to users' web data?
If the latter, why don't you just chroot them directly into their
user dir inside web root? Or, just define their home to be inside
web chroot...
j.
like I stated bevor I know I can simply give them there we
s not possible on OpenBSD, mount will tell "device is busy".
>
> On linux you should use mount --bind to bind a folder on another instead
> of mounting twice the mountpoint. FreeBSD has mount_nullfs to do exactly
> the same thing as --bind, but OpenBSD doesn't have any of
Je 2017-06-14 13:02, Bryan Harris skribis:
On Linux I have mounted another fs inside the user's home folder (it is
mounted twice). I don't know if OpenBSD has that feature.
This is not possible on OpenBSD, mount will tell "device is busy".
On linux you should use mount --bind to bind a folde
> --
> Regards,
> Ville
>
>
> On Jun 14, 2017 11:34 AM, "Markus Rosjat" wrote:
>
> Hi there,
>
> I want to build an sftp environment where the user is chrooted to his home
> dir. So far so good but then again the user might need access to a
> webserv
Hi,
one option is to use local nfs mounts. That's what I've done.
--
Regards,
Ville
On Jun 14, 2017 11:34 AM, "Markus Rosjat" wrote:
Hi there,
I want to build an sftp environment where the user is chrooted to his home
dir. So far so good but then again the user mi
Je 2017-06-14 10:33, Markus Rosjat skribis:
Hi there,
I want to build an sftp environment where the user is chrooted to his
home dir. So far so good but then again the user might need access to
a webserver resource like /var/www/htdocs/some_dir
As far as I understand a symlink doesnt work in
Hi there,
I want to build an sftp environment where the user is chrooted to his
home dir. So far so good but then again the user might need access to a
webserver resource like /var/www/htdocs/some_dir
As far as I understand a symlink doesnt work in the chroot setup and Im
not quiet sure how
Thu, 21 Jul 2016 09:54:05 +0200 Denis Fondras
> Hi John,
>
> > Can anybody recommend a good cloud storage provider that has access
> > via sftp or rsync tunneled through ssh? Everything I have found
> > seems targeted at Windows, Linux, phones etc. with no
> &g
Hi John,
> Can anybody recommend a good cloud storage provider that has access via sftp
> or rsync tunneled through ssh? Everything I have found seems targeted at
> Windows, Linux, phones etc. with no platform-agnostic interface.
>
French hoster Online.net has a new storage servic
On 7/20/16 8:31 AM, Sam Hays wrote:
2016-07-20 11:27 GMT+02:00 John Long :
Can anybody recommend a good cloud storage provider that has access
via sftp or rsync tunneled through ssh? Everything I have found seems
targeted at Windows, Linux, phones etc. with no platform-agnostic interface
On Wed, Jul 20, 2016 at 12:05:42PM -0400, Brian B wrote:
>> Run an ??ber cheap VM (or a pair for HA) in AWS or Azure and use their
underlying cloud storage, albeit at a cost premium.
>>
>> That way you can setup any number of protocols to access the storage.
>
> Thanks, that's actually a _really_ g
Wed, 20 Jul 2016 14:31:16 + Sam Hays
> 2016-07-20 11:27 GMT+02:00 John Long :
> > Can anybody recommend a good cloud storage provider that has access
> > via sftp or rsync tunneled through ssh? Everything I have found seems
> > targeted at Windows, Linux, phones
On Wed, Jul 20, 2016 at 12:05:42PM -0400, Brian B wrote:
> Run an ??ber cheap VM (or a pair for HA) in AWS or Azure and use their
> underlying cloud storage, albeit at a cost premium.
>
> That way you can setup any number of protocols to access the storage.
Thanks, that's actually a _really_ goo
On Wed, Jul 20, 2016 at 02:31:16PM +, Sam Hays wrote:
> 2016-07-20 11:27 GMT+02:00 John Long :
> > Can anybody recommend a good cloud storage provider that has access
> > via sftp or rsync tunneled through ssh? Everything I have found seems
> > targeted at Windows, Linux
2016-07-20 11:27 GMT+02:00 John Long :
> Can anybody recommend a good cloud storage provider that has access
> via sftp or rsync tunneled through ssh? Everything I have found seems
> targeted at Windows, Linux, phones etc. with no platform-agnostic interface.
>
Consider AWS / S3
On Wed, Jul 20, 2016 at 04:01:21PM +0200, matteo filippetto wrote:
> 2016-07-20 11:27 GMT+02:00 John Long :
> > Can anybody recommend a good cloud storage provider that has access via sftp
> > or rsync tunneled through ssh? Everything I have found seems targeted at
> > Windo
2016-07-20 11:27 GMT+02:00 John Long :
> Can anybody recommend a good cloud storage provider that has access via sftp
> or rsync tunneled through ssh? Everything I have found seems targeted at
> Windows, Linux, phones etc. with no platform-agnostic interface.
>
http://www.tarsnap.
On Wed, Jul 20, 2016 at 01:53:23PM +0200, Morten Liebach wrote:
> Check rsync.net.
That's the type of thing I'm looking for but their prices are totally out of
line with anything I've seen. I can pay 100 bucks a year for 1T of
storage. I can't pay 1,100 bucks a year for 300G of storage.
I'm hopin
On Wed, Jul 20, 2016 at 01:53:20PM +0200, Sol??ne wrote:
> Le 2016-07-20 11:27, John Long a ??crit??:
> >Can anybody recommend a good cloud storage provider that has
> >access via sftp
> >or rsync tunneled through ssh? Everything I have found seems
> >targeted at
&g
Le 2016-07-20 11:27, John Long a écrit :
Can anybody recommend a good cloud storage provider that has access via
sftp
or rsync tunneled through ssh? Everything I have found seems targeted
at
Windows, Linux, phones etc. with no platform-agnostic interface.
Thanks.
/jl
hello
ownCloud
Can anybody recommend a good cloud storage provider that has access via sftp
or rsync tunneled through ssh? Everything I have found seems targeted at
Windows, Linux, phones etc. with no platform-agnostic interface.
Thanks.
/jl
--
ASCII ribbon campaign ( ) Powered by Lemote Fuloong
against
On 16 May 2015 at 01:19, Craig Skinner wrote:
>
> I used to have a script create batch files in /tmp,
> each with the full name of the incremental dump file to sftp.
>
> But I've found rdist. (OpenBSD uses ssh by default.)
>
> Look at rdist(1) EXAMPLES sectio
Hello,
Am 16.05.2015 um 01:07 schrieb jungle Boogie:
I want to upload a file automatically with a cron job so I'm using the -b flag.
% sftp jungle@host
Connected to host.
sftp> cd home/jungle
sftp> put file_*.csv
Uploading file_foo2015-05-15.csv to /usr/home/jungle/file_foo201
On 2015-05-15 Fri 20:58 PM |, Barry Grumbine wrote:
>
> I have never used sftp, but from the man page it looks like the sftp
> commands need to be in a separate file.
Yes.
I used to have a script create batch files in /tmp,
each with the full name of the incremental dump file to sftp.
Hi Barry,
On 15 May 2015 at 20:58, Barry Grumbine wrote:
> Hi,
>
> I have never used sftp, but from the man page it looks like the sftp
> commands need to be in a separate file. Something like:
>
> fetch2.sh:
> #!/bin/sh
> sftp -b /home/jungle/batchfile jungle@host
&g
Hi,
I have never used sftp, but from the man page it looks like the sftp
commands need to be in a separate file. Something like:
fetch2.sh:
#!/bin/sh
sftp -b /home/jungle/batchfile jungle@host
/home/jungle/batchfile:
cd /home/jungle
put file_*.csv aaa_completed
If it were me, I would just use
Hello All,
Running Openssh's sftp version 3 on both client and server but the OS
is not openBSD.
I want to upload a file automatically with a cron job so I'm using the -b flag.
% cat fetch2.sh
#!/bin/sh
cd /home/jungle
put file_*.csv aaa_completed
I can't specify the file
On 05/01/15 09:35, Markus Rosjat wrote:
> well I got it running to a point were my user got loged in to his home dir.
> he is now chrooted to /var/sftp because this one is owned by root and
> not writeable for others.
> still can jump from home dir (well it's not really this h
okay short "improvement" maybe the wrong way but so you can revoke the
exexute permission on others
I changed ownership of /var/sftp to root:sftpuser and permission to 0710
Am 01.05.2015 um 15:46 schrieb Markus Rosjat:
Am 01.05.2015 um 15:36 schrieb Markus Rosjat:
well I got it ru
Am 01.05.2015 um 15:36 schrieb Markus Rosjat:
well I got it running to a point were my user got loged in to his
home dir.
he is now chrooted to /var/sftp because this one is owned by root and
not writeable for others.
still can jump from home dir (well it's not really this home)
/var
well I got it running to a point were my user got loged in to his home dir.
he is now chrooted to /var/sftp because this one is owned by root and
not writeable for others.
still can jump from home dir (well it's not really this home)
/var/sftp/testsftp to the root (which is the actual
On 05/01/15 07:07, Markus Rosjat wrote:
> hi there,
>
> I just do some testing with sftp access and I stumbled about some things
> I dont get.
>
> if I use the chroot I would asume the user cant browse to the root dir
> but it seems he can.
> Do I get the whole chroot
hi there,
I just do some testing with sftp access and I stumbled about some things
I dont get.
if I use the chroot I would asume the user cant browse to the root dir
but it seems he can.
Do I get the whole chroot thing wrong here ?
I set sshd up to just use key auth and gave the user a
Em 23-05-2014 14:13, Kevin Chadwick escreveu:
> I have replaced samba with sftp and have an issue with atleast one app
> (sage accounts, still trying to evaluate gnucash) that seems to be using
> uppercase and then lower case filenames at different times.
>
> I could move all the
I have replaced samba with sftp and have an issue with atleast one app
(sage accounts, still trying to evaluate gnucash) that seems to be using
uppercase and then lower case filenames at different times.
I could move all the data about and create an msdosfs or look to
lowntfs-3g which I am not
sorry. -R is specific to sftp and sftp doesn't read ssh_config.
> As far as sftp is concerned, the underlying ssh is just an 8-bit
> clean bidirectional pipe.
Okay, thanks!
Daniel
On Sun, Mar 9, 2014 at 7:51 AM, LEVAI Daniel wrote:
> For the life of me I can not find the correspondig ssh option in
> ssh_config(5) for sftp's -R switch. Is that even configurable with -o ?
Nope, sorry. -R is specific to sftp and sftp doesn't read ssh_config.
As far as s
Hi!
For the life of me I can not find the correspondig ssh option in
ssh_config(5) for sftp's -R switch. Is that even configurable with -o ?
Daniel
--
LÉVAI Dániel
PGP key ID = 0x83B63A8F
Key fingerprint = DBEC C66B A47A DFA2 792D 650C C69B BE4C 83B6 3A8F
ay inside a Match block.
>
> jbelke
It seems to behave the same with the Subsystem option as well:
Subsystem sftp/usr/libexec/sftp-server -u 000
Regards,
/Lars
On Wed, Oct 23, 2013 at 10:52:51AM +0300, Lars Noodén wrote:
> This is on OpenSSH_6.3 from current. If I interpret the man page for
> sftp-server(8) correctly, the option -u should set an explicit umask.
> What looks like is happening instead is that the umask is OR'ed with an
This is on OpenSSH_6.3 from current. If I interpret the man page for
sftp-server(8) correctly, the option -u should set an explicit umask.
What looks like is happening instead is that the umask is OR'ed with an
established value. How do I set or override that initial umask?
What's
On 21 September 2013 17:07, wrote:
> Is it possible to limit the accepted file size of any uploaded file by
> configuring the ftp or the sftp server (OpenBSD 5.3/amd64)?
>
You can do this on a per-user basis with a login class (man login.conf,
then man useradd) but the user experien
Is it possible to limit the accepted file size of any uploaded file by
configuring the ftp or the sftp server (OpenBSD 5.3/amd64)?
If not, can it be done by pf?
John
Hugo Osvaldo Barrera wrote:
> Sadly, my hardware doesn't support AESNI.
> Would something like a Soekris 1401(hifn) make up for that, or am I mixing
> stuff up?
Crypto devices outside the CPU aren't that great. For each
en-/decryption, the device needs to be set up, the data moved to
and the re
On 2013-08-21 15:28, Christian Weisgerber wrote:
> Darren Tucker wrote:
>
> > > I noticed my CPU supports AES, but not AESNI, so at first, I though
that
> > > that might be using up all my CPU, but that only accounts for for 48%
of
> > > CPU usage. Is there anything else I can do to improve perfor
1 - 100 of 330 matches
Mail list logo