Displaying 20 results from an estimated 80000 matches similar to: "sftp file locking"
2002 Oct 21
1
Developers word on SFTP/SCP chroot'ing?
Hello all,
I've taken a brief skim of the archives available on theaimsgroup and talked
to some others regarding the ideas on chroot SSH/SFTP/SCP functionality. I've
also investigated a few of the various patches out for chroot sftp|scp|ssh and
am a bit of a loss at finding 'an elegant solution' to the problem.
Bearing in mind the excellent starting ground of John Furman's
2010 Jun 30
5
Possible feature request: sync_on_close mode for scp/sftp uploads
Hi all,
First, my apologies if this is not the right forum for this... if there is a more appropriate place to make OpenSSH feature requests, or if this feature already exists, please let me know.
Some background: My company makes an 'embedded' audio server box that runs Debian Linux, and one of the product's features is that users can upload files to the server via SSH, using their
2011 Apr 12
2
advisory file locks in linux - do they work?
Hi - I'm trying to verify if OpenSSH/SFTP will in fact lock files with
advisory file locking in Linux. I can test locking with the linux
"flock" command to verify that file locking does work - but when I
upload or download a file with SFTP it will not detect a lock. I'm
asking about Linux specifically because about a year ago I was doing a
similar process in Solaris 9 and
2001 May 21
3
Strange interaction of sftp and protocol version 1
As I read the manpage, you need to enable Subsystems to have the server
support them.
[...]
Subsystem
Configures an external subsystem (e.g., file transfer daemon).
Arguments should be a subsystem name and a command to execute up?
on subsystem request. The command sftp-server(8) implements the
``sftp'' file transfer
2009 Nov 18
1
internal-sftp atomic file operations?
Hi
I've been testing internal-sftp with chroot on OpenSSH_5.3p1 and it
seems that internal-sftp does not support POSIX atomic rename()
operations.
Can someone confirm that this feature is only available in the
sftp-server and not internal-sftp?
Are there plans to include atomic file operations in internal-sftp?
Thanks
2017 Sep 06
2
Disallow some sftp commands
Hello,
Couple of days ago, I received a request from a customer.
He wants to provide sftp users access to a directory tree containing files.
The users must have full rights, but he also wants to avoid moving or
deleting directories. This is mostly to prevent mistakenly drag and
drop from user's graphical client (Filezilla).
Said differently, he wants to protect the directories organization.
2008 Feb 23
3
sftp-server failing to rename a file
What to try:
$ cd /tmp
$ touch a b
$ sftp localhost
sftp> cd /tmp
sftp> rename a b
Couldn't rename file "/tmp/a" to "/tmp/b": Failure
sftp> rm b
Removing /var/tmp/b
sftp> rename a b
sftp>
So, the sftp "rename" command refuses to rename a file
to an existing one.
Instead of using the rename(2) system call, which is present at least on
2013 Jul 01
9
[Bug 2123] New: does not seem to support sftp protocol version 5 rename flag for overwriting files
https://bugzilla.mindrot.org/show_bug.cgi?id=2123
Bug ID: 2123
Summary: does not seem to support sftp protocol version 5
rename flag for overwriting files
Product: Portable OpenSSH
Version: 6.2p1
Hardware: Other
OS: Linux
Status: NEW
Severity: enhancement
Priority: P5
2015 Aug 02
2
Chrooted SFTP-only users along with normal SFTP
Hi!
I want to set a OpenSSH server which restricts some users to only
chrooted SFTP, while others have full/normal ssh, scp and sftp access.
Most or all guides on the web say that I should enable the config line
"Subsytem sftp internal-sftp" among other things, but I've found out
that this only causes non-restricted users to not be able use SFTP at
all, only the chrooted users.
2013 Dec 24
1
sftp-server versus internal-sftp
Hi,
I recently discovered that my ~/.bashrc file was preventing me from
using SFTP successfully. I then found documentation of sftp-server
and internal-sftp. However, I could not find answers to the following
questions in the documentation.
1) What are the advantages of sftp-server over internal-sftp? (I
believe Ubuntu and Debian both default to "Subsystem sftp
2004 Apr 06
7
[Bug 833] sshd server sends SshMsgChannelFailure despite of successfully running sftp server
http://bugzilla.mindrot.org/show_bug.cgi?id=833
Summary: sshd server sends SshMsgChannelFailure despite of
successfully running sftp server
Product: Portable OpenSSH
Version: 3.8p1
Platform: All
OS/Version: Cygwin on NT/2k
Status: NEW
Severity: normal
Priority: P2
Component: sshd
2007 Dec 07
2
[PATCH] add statfs extension to sftp-server
And while we are at it, can you please comment on these patches as
well, originally submitted around one year ago.
Oh, and I think we can agree, that the secsh-filexfer standardization
is dead, so there's not much point in trying to support newer protocol
versions, which don't have statfs anyway.
Thanks,
Miklos
-----
This is needed to be able to support statfs operation on an SSH
2009 Feb 12
2
[patch] hard link protocol extension for sftp
Here's a patch that adds support for the creation of hard links over
SFTP.
Hard links are not used very often nowdays, but they do still have
their uses and this is currently the most often requested improvement
for SSHFS.
To detect hard links the st_nlink, st_dev and st_ino attributes are
usually used. I'll also post patches adding extensions for these and
other attributes.
Please
2008 Jun 20
1
ForceCommand internal-sftp causes sftp logging to fail (openssh-5.0p1)
Hi guys,
I have a server setup with openssh-5.0p1 and use some users as
sftp-only chroot accounts.
The following configuration yields exactly the result I want:
user is chrooted, logs to syslog, all is good.
#================================================#
Subsystem sftp internal-sftp -f AUTHPRIV -l VERBOSE
Match User fredwww
ChrootDirectory %h
#ForceCommand internal-sftp
2010 Sep 17
5
should vsftpd be disabled in favour of sftp for security reasons?
(another in an ongoing list of things i just want to clarify for the
sake of future courses taught on centos.)
from this RHEL doc page:
http://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/5/html/Deployment_Guide/s1-openssh-server-config.html
the reader is advised to, for the sake of security, remove/disable
vsftpd, ostensibly in favour of sftp/sftp-server. really?
i can obviously
2008 Nov 11
2
Fwd: Permissions in chroot SFTP
Hi,
I configured openssh 5.1p1 for sftp server.
Here the specifications in sshd_config file:
Subsystem sftp internal-sftp
Match Group sftp
ForceCommand internal-sftp
ChrootDirectory /home/%u
AllowTcpForwarding no
When a user is logged in, he can't upload his document and he receives
this message:
carlo at Music:~$ sftp user at 213.217.147.123
Connecting to
2001 Feb 10
2
SNAP 20010209 fails to compile sftp on Slackware
Yo All!
openssh-SNAP-20010209.tar.gz fails to compile on Slackware. Patch at
the end of this message.
Here is the error:
gcc -o sftp sftp.o sftp-client.o sftp-common.o sftp-int.o log-client.o -L. -Lopenbsd-compat/ -L/usr/local/ssl/lib -L/usr/local/ssl -lssh -lopenbsd-compat -lcrypt -lz -lnsl -lutil -lcrypto -lwrap
openbsd-compat//libopenbsd-compat.a(bsd-arc4random.o): In function
2014 Jun 25
4
SFTP &
Hello List.
?
i?m trying to setup a limited SSH server with SFTP.
The requirements:
-????????? There are users to whom only SFTP should be available. (sftp-only group)
-????????? There are users to whom SFTP and shell access should be available (admin group)
-????????? SFTP clients have to authenticate with username and password
-????????? shell users have to authenticate with private key.
2008 Nov 11
3
Directory permissions in chroot SFTP
Hi,
I configured openssh 5.1p1 for sftp server.
Here the specifications in sshd_config file:
Subsystem sftp internal-sftp
Match Group sftp
ForceCommand internal-sftp
ChrootDirectory /home/%u
AllowTcpForwarding no
When a user is logged in, he can't upload his document and he receives
this message:
carlo at Music:~$ sftp user at 213.217.147.123
Connecting to
2003 Apr 09
2
[Bug 542] OpenSSH 3.6.1p1 - sftp exit codes and improved logging for scripting
http://bugzilla.mindrot.org/show_bug.cgi?id=542
Summary: OpenSSH 3.6.1p1 - sftp exit codes and improved logging
for scripting
Product: Portable OpenSSH
Version: -current
Platform: Sparc
OS/Version: Solaris
Status: NEW
Severity: normal
Priority: P2
Component: sftp
AssignedTo: