Download a file over an active SSH session


is "pat". To connect to your remote account from your friend's account on

over the Internet, asking to be logged into the remote account with username pat.

secure channel between the client and the server so all transmissions between them are encrypted. The client then prompts for your password, which it supplies to the server over the secure channel. The server authenticates you by checking that the password is correct and permits the login. All subsequent client/server exchanges are protected by that secure channel, including the contents of the email you proceed to read using a mail program on

. It's important to remember that the secure channel exists only between the SSH client and server machines. After logging into

is not secure. However, you can run another

, creating another secure channel, which keeps the chain of connections secure. We've covered only the simplest use of


goes into far greater depth about its many...

0 0

I have been using arch on my server for some years, now, and it worked great, but around a few weeks/months ago (I can’t pinpoint the date/upgrade), ssh stopped working properly.

I can always log in just fine (server logs confirm that), but I only get a “real” interactive session once in a while (meaning, a prompt), the other times I am logged and I can send commands to the server (even ^D), as if I had a shell, but no output is displayed.

Moreover, the output of ssh -v is strictly the same (ips, hostname and keys removed):
A working session:

prompt% ssh user@server -v OpenSSH_6.1p1, OpenSSL 1.0.1c 10 May 2012 debug1: Reading configuration data /etc/ssh/ssh_config debug1: Connecting to server [ipv6] port 22. debug1: Connection established. debug1: identity file /home/mathieui/.ssh/id_rsa type 1 debug1: identity file /home/mathieui/.ssh/id_rsa-cert type -1 debug1: identity file /home/mathieui/.ssh/id_dsa type -1 debug1: identity file...
0 0

Because serverfault defaults my answers to comments, i copied over the proper answer from this post :

The best way to do this would be to use pam.

In /etc/pam.d you will have several files, one of them will be called sshd. If you only want to affect ssh, and not other logins (such as a GUI, or real TTY), you want this file.
If you want to affect all logins, you’ll want a ‘common’ file. The name of this other ‘common’ file varies by distro, but you can track it down by following the include and substack statements in the sshd file until you get to the base file.

Once you’ve identified the file in /etc/pam.d that you want to use, add a line such as the following to the session section:

session optional quiet /etc/

This will result in calling /etc/ every time someone logs in and logs out (whether gracefully or ungracefully).

Now you just need to create /etc/ Below is an example you could...

0 0

SSH is a lifesaver when you need to remotely manage a computer, but did you know you can also upload and download files, too? Using SSH keys, you can skip having to enter passwords and use this for scripts!

This process works on Linux and Mac OS, provided that they’re properly configured for SSH access. If you’re using Windows, you can use Cygwin to get Linux-like functionality, and with a little tweaking, SSH will run as well.

Copying Files Over SSH

Secure copy is a really useful command, and it’s really easy to use. The basic format of the command is as follows:

scp [options] original_file destination_file

The biggest kicker is how to format the remote part. When you address a remote file, you need to do it in the following manner:


The server can be a URL or an IP address. This is followed by a colon, then the path to the file or folder in question. Let’s look at an example.

scp –P 40050...

0 0


I'm running a Red Hat 7.2 server and the latest open-ssh server.

When I ssh into my server (whether from Win XP using PuTTY, or from an AIX box at work), my session is terminated on the first even 10 minutes after one hour even if I am in the middle of something like vi'ing a file.

It's as if some process is cronned to run or check for ssh sessions every 10 minutes and if a session is found that is over one hour it terminates the session.

I don't think it's anything related to my ssh config, I think it is something else, but I can not figure it out... Please help!

In case it helps, here is my sshd_config:
Subsystem sftp /usr/local/libexec/sftp-server
IgnoreRhosts yes
IgnoreUserKnownHosts no
PrintMotd yes
StrictModes yes
RSAAuthentication yes
PermitRootLogin no
PermitEmptyPasswords no
PasswordAuthentication yes
GatewayPorts no
AllowTcpForwarding yes
KeepAlive no

0 0

I am trying to use Plink for running commands on remote server. Both, local & remote machine are Windows. Though I am able to connect to the remote machine using Plink, i am not able to use the '-m file' option. I tried the following three ways but to no avail:

Try 1:

plink.exe -ssh -pw mypwd gchhabra@machine -m file.txt


Could not chdir to home directory /home/gchhabra: No such file or directory dir: not found

'file.txt' only contains one command i.e., dir

Try 2:

plink.exe -ssh -pw mypwd gchhabra@machine dir


Could not chdir to home directory /home/gchhabra: No such file or directory dir: not found

Try 3:

plink.exe -ssh -pw mypwd gchhabra@machine < file.txt

In this case, I get the following output:

Using username "gchhabra". ****USAGE WARNING**** This is a private computer system. This computer system, including all ..... including personal information, placed or sent over this system may be...
0 0

Our SSH client supports all desktop and server versions of Windows, 32-bit and 64-bit, from Windows XP SP3 and Windows Server 2003, up to the most recent – Windows 10 and Windows Server 2016.

Our client is free for use of all types, including in organizations. To begin, simply download it here.

Our SSH and SFTP client for Windows incorporates:

One of the most advanced graphical SFTP clients.

Single-click Remote Desktop forwarding.

State-of-the-art terminal emulation with support for the bvterm, xterm, and vt100 protocols.

Support for corporation-wide single sign-on using SSPI (GSSAPI) Kerberos 5 and NTLM user authentication, as well as Kerberos 5 host authentication.

Support for ECDSA, RSA and DSA public key authentication with comprehensive user keypair management.

FIPS 140-2 validation: When FIPS is enabled in Windows, our software uses Windows built-in cryptography, validated by NIST to FIPS 140-2 under certificates #2937,...

0 0

See below for the news on the latest developments and improvements to FirePlotter. If you want to see our future development plans for FirePlotter, please click here: RoadMap

December 2016 - FirePlotter 2.24 b161201released!


- Added support for FG-52E (C1), FG-90E(C1), FG-91E(C1).

Bug Fix:

- None.

September 2016 - FirePlotter 2.24 b160916 released!


- Added support for FG-60E (C1), FG-61E(C1), FWF-60E(C1), and FWF-61E (C1).

- Allowed graph heading to be renamed via RegEdit String Values within HKEY_CURRENT_USER\Software\\FirePlotter\FP-GlobalSettings Graph.Left.Fortinet, Graph.Right.Fortinet, Graph.Left.Cisco, Graph.Right.Cisco .

Bug Fix:

- FortiOS 5.4 introduced Policy ID = 4294967295, to indicate 'local policy in' (SSL VPN, management etc.). FirePlotter can now handle filtering the Policy ID with such a large value. Policy ID 0, is FortiGate initiated...

0 0