At line 1 changed 20 lines |
A [https://www.sftp.net/servers|RFC] compliant pure __SFTP/SCP__ server implementation. SSH [Tunneling|tunnels] is supported in CrushFTP. An SSH shell is __not allowed__ as its often the method used in exploits. A shell has no purpose in file transfer. |
|
[Public / Private| UserManagerRestrictionsSSH] key authentication is supported too. The ciphers can be customized to prevent wasted CPU usage from inefficient ciphers. |
|
By default, there is an Idle Timeout set to 300 sec (5 min). Go to the SSH tab in the IP/Servers to change. In order for this change to take effect, you must restart the server for the IP. |
%%tabbedSection |
%%tab-tabTitle1 |
tab content 1 |
/% |
%%tab-tabTitle2 |
tab content 2 |
/% |
%%tab-tabTitle3 |
tab content 3 |
/% |
/% |
|
[{Image src='img.jpg' width='..' height='..' align='left|center|right' style='..' class='..' }] |
|
[attachments|sftp_ssh.png] |
A [RFC|https://www.sftp.net/servers] compliant pure __SFTP/SCP__ server implementation. SSH [Tunneling|tunnels] is supported in CrushFTP. An SSH shell is __not allowed__ as its often the method used in exploits. A shell has no purpose in file transfer.\\ |
At line 3 added 8 lines |
[Public / Private| UserManagerRestrictionsSSH] key authentication is supported too. The ciphers can be customized to prevent wasted CPU usage from inefficient ciphers.\\ |
\\ |
By default, there is an SFTP server listener configured with __compatible defaults__ bound to port __2222__ readily available on first deploy.\\ |
\\ |
\\ |
\\ |
[{Image src='sftp_ssh2.jpg' width='1140' height='..' align='left' style='..' class='..' }]\\ |
\\ |
At line 24 changed one line |
aes128-ctr,aes192-ctr,aes256-ctr,3des-ctr,3des-cbc,blowfish-cbc,arcfour,arcfour128,arcfour256,aes128-gcm@openssh.com,aes256-gcm@openssh.com,chacha20-poly1305@openssh.com |
aes128-ctr,aes192-ctr,aes256-ctr,3des-ctr,3des-cbc,blowfish-cbc,arcfour,arcfour128,arcfour256,aes128-gcm@openssh.com,aes256-gcm@openssh.com |
At line 26 changed one line |
''aes128-cbc,aes192-cbc,aes256-cbc are also supported but not recommended due to their known insecurity.''\\ |
''aes128-cbc,aes192-cbc,aes256-cbc,chacha20-poly1305@openssh.com are also supported but not recommended due to their known insecurity.''\\ |