Sponsored Content
Top Forums UNIX for Beginners Questions & Answers Sftp does not work for particular user Post 303034091 by Neo on Thursday 18th of April 2019 02:10:06 AM
Old 04-18-2019
This appears to be an error related to public-private key pair configuration issues.

One suggestion we see often in forum and blog when this happens is to clear out (or move to a temp location) all your key pairs on both server and client, rebuild and reinstall.
 

10 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

How to restrict user to sftp usage?

Hi everyone! I have a problem... I need to restrict user to sftp usage only from one computer to another... I mean that the user cannot login to the computer or even use sftp from other computer only from the one i allow. thanx for the help! (13 Replies)
Discussion started by: eliraza6
13 Replies

2. UNIX for Advanced & Expert Users

will sftp work with /bin/false

helo helo I have create user for the group and entry for the user in /etc/passwd file is liek this bhavin:x:2014:109:test:/home/pds_RBAC:/bin/false I have keep here /bin/false now i m accesing user through sftp ow when i access that user using sftp from the another linux pc for e.g... (1 Reply)
Discussion started by: amitpansuria
1 Replies

3. UNIX for Dummies Questions & Answers

FTP or SFTP User

Hello there, is there any command in Unix to check that following ftp user is ftp or sftp user. Thanks. (1 Reply)
Discussion started by: ahhmedbilal
1 Replies

4. Shell Programming and Scripting

SFTP using user id and password

Hi, I am using below syntax - sftp -b passwordfile userid@ipaddress passwordfile is a file, in which I have just kept a password of userid. But by this, an error is coming like - Permission denied (publickey,password,keyboard-interactive). Please suggest me on this..as I dont... (6 Replies)
Discussion started by: Monalisa
6 Replies

5. AIX

restricting sftp and ssh for a user

I want to know if there is any way to set up a users home directory access with a restricted shell and allow them to SFTP to the directory. I want to allow the user to SSH into their home directory but no where else on the AIX server. I also want the user to be able to SFTP files to their home... (1 Reply)
Discussion started by: daveisme
1 Replies

6. Shell Programming and Scripting

SFTP with domain user

Hello Guys, I need help on SFTP from Solaris to Windows. I am doing SFTP from Solaris to Windows and its working fine with COPSSH installed on windows. But when I want to login to windows (remote) with Domain user of windows network, I have no idea how to do it. Can you please help... (1 Reply)
Discussion started by: Deei
1 Replies

7. UNIX for Advanced & Expert Users

Sftp user chrooted in a directory

Hello, I have a task to create 3 users that must connect only via sftp on a machine, and must have only read access to a certain directory (thay shouldn;t be able to cd anywhere else) The problem is that the directory where these users must have access to, it's already created/owned by another... (0 Replies)
Discussion started by: black_fender
0 Replies

8. Red Hat

No shell access to sftp user

I have created two users on our ftp server. They will use sftp to connect this server. But I do not want them to give direct ssh access. If I give /bin/false shell, sftp will not work. If I give /bin/nologin, it fails with below messages # sftp trdeo@bd01.xxx.com Connecting to bd01.xxx.com...... (6 Replies)
Discussion started by: solaris_1977
6 Replies

9. Shell Programming and Scripting

Passwordless sftp using a different user than the runtime user

I am running a shell script as user A. In that script I need to execute a sftp that would transfer the file using another user B. I am using the below command: sftp -oPort22 B@remote server However, I am getting password prompts each time. I have done the following: Added the public... (4 Replies)
Discussion started by: mady135
4 Replies

10. Red Hat

Beginner : sftp doesnt work

Hello, I really appreciate any help on this. Have to connect to external server via sftp. Our server is Linux machine Linux our.server.com 3.10.0-514.26.2.el7.x86_64 #1 SMP Tue Jul 4 15:04:05 UTC 2017 x86_64 x86_64 x86_64 GNU/Linux I generated the keys, put them in /root/.ssh, sent... (3 Replies)
Discussion started by: billy5
3 Replies
FETCHFILE(7)						 Miscellaneous Information Manual					      FETCHFILE(7)

NAME
O-SAFT / fetchfile DESCRIPTION
Introduction With the server protocol extension O-SAFT (Offer Simple Asynchronous File Transfer) and the matching client fetchfile there is an easy method of retrieving files from a SAFT server. This is a direct analogy to the SMTP and POP or APOP protocol suite in the world of e-mail transfer. Overview: - How does O-SAFT/fetchfile work? - What to do on the client side? - What to do on the server side? - How about security issues? How does O-SAFT/fetchfile work? O-SAFT is an extension to the existing SAFT protocol and allows athenticated clients to retrieve files from a (remote) server. The imple- mention is the server sendfiled and the client fetchfile. O-SAFT uses a dedicated pgp key pair to authenticate the fetchfile session. The private key will be kept on the client side, the public key must tbe present at the server side. For security reasons this will NOT be your regular e-mail pgp key pair, but a separate pair of pgp keys, uniquely assigned for fetchfile transfers. You will have to create a pair of pgp keys for this purpose befor using the fetchfile client for the first time (see below). Fetchfile can provide a directory listing of available files from the server, retrieve files or delete files. After retrieving a file, it will be placed in the regular spool directory, not in the current directory! You will have to use the receive command to transfer the files from the spool directory to your current directory afterwards. If there already exists a regular sendfile spool directory /var/spool/sendfile on the client side it will be used, otherwise a $HOME/.sfspool will be created. Fetchfile will be running without using root permissions on the client side. What to do on the client side? You must have pgp-2.6.x installed and the binaries must be available through your $PATH environment variable. First, and ONLY ONCE before using fetchfile the very first time, you have to create a fetchfile pgp key pair (only pgp-2.6.x is sup- ported!): fetchfile -I Please only hit 'ENTER' when being asked for a pass phrase! This will create a special non-passphrase protected key pair for O-SAFT. After this initialization you will have a file /var/spool/sendfile/$USER/config/public.pgp resp. $HOME/.sfspool/public.pgp Please send this file to root@SAFT-server, who has to save this public key file into the appropiate user configuration directory. Example: sendfile -c 'my O-SAFT puplic key' /var/spool/sendfile/$USER/config/public.pgp root@bofh.belwue.de (This prelimary action will enable you to use the SAFT server and will prevent othes from abusing your name or SAFT-account on the server.) After preparing the pgp keys an both sides, you can invoke fetchfile on a regular basis: fetchfile -l list files on the server fetchfile -a retrieve all files from server fetchfile -daf *aol.com delete all files from the AOL domain There is a detailed description of all capabilities in the fetchfile(1) man page. For configuring the server SAFT account by the client user there are two options: fetchfile -Cw=config fetchfile -Cw=restrictions Using this the two local configuration files will be transfered from the local current directory to the SAFT server. The details of the configuration can be found in the sendfile(1) man page. With using fetchfile -Cr=config fetchfile -Cr=restrictions the files will be retrieved back and will be displayed to STDOUT. What to do on the server side? pgp-2.6.x must be installed. The system adminsitrator needs to run sfdconf -e config add set the following option: fetchfile = on The system administrator must create a user account (if it does not yet exist). This account does not need an interactive login shell and does not need a valid password; the login shell could be /bin/false. The only purpose is to enable the sendfiled to check out the user and to create a local spool directory (this method is well known for creating POP mail accounts). The client user will create the initial pgp key pair and the public key (public.pgp) will be sent to the system administrator of the server. This key has to be placed into the config directory for the particular user. Assuming the user name is bozo, the system adminis- trator will have to type the following (under root permissions): receive -f bozo@* -b bozo public.pgp su bozo cd /var/spool/sendfile/bozo/config receive public.pgp (the first receive resends the file public.pgp from the sender bozo@* to the local user bozo) How about security issues? O-SAFT uses a tcp challenge/response authentication with a pgp signature. This opens the possibility that the session can be attacked through tcp hijacking. We are well aware of this, but tcp hijacking is not easy and only possible if the attacker has direct access to the transport media (e.g. listening on the same ethernet cable/segment) and has access to a set of pretty nice cracker tools. With regular operating system supplied software it is not possible to attack a session. SEE ALSO
sendfile(1), fetchfile(1), sendfiled(8). AUTHOR
Ulli Horlacher - framstag@rus.uni-stuttgart.de translated by andreas@citecs.de 3rd Berkeley Distribution FETCHFILE(7)
All times are GMT -4. The time now is 12:45 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy