I routinely copy files to/from Windows to my Linux boxes, and the best way I've found is either use Dolphin and smb:// or use samba client from the command line. Getting SSH/SCP/SFTP to work on Windows isn't trivial (at least it hasn't been) so I just skip that effort altogether. Another method I've used it to share an external USB drive and use USB Anywhere to connect the Windows box to it. Windows SSH support astonishingly still sucks badly so I don't bother trying to use that method.
On Tue, Mar 22, 2016 at 8:27 AM, Gary Stainburn <gary.stainburn@xxxxxxxxxxxxxx> wrote:
I need a way to rebustly copy files from a Fedora server to a Windows box. As
my usual environment is Linux by first thought was SCP, using Perl and
Net::SCP.
I first tried an OpenSSH install from the WinSCP site and had managed to
connec to the Windows box using passwords, but could not get public keys to
work either way.
I then downloaded OpenSSH for Windows using the installer found at
http://www.mls-software.com/opensshd.html
Using this setup I can ssh from the Windows box to my Fedora server and it
logs in successfully using keys. However, I still cannot connect from Fedora
to Windows.
Oddly, I do get the banner.txt file appear in the login attempt.
Also oddly, the attemp doesn't drop down to passwords when the keys fail even
though it has
PasswordAuthentication yes
in sshd_config. Can anyone suggest what I try next. Below is the terminal
session from the Fedora box.
[root@lou ~]# gvim .ssh/authorized_keys
[root@lou ~]# ssh -v -l Administrator lcomp6
OpenSSH_6.2p2, OpenSSL 1.0.1e-fips 11 Feb 2013
debug1: Reading configuration data /etc/ssh/ssh_config
debug1: /etc/ssh/ssh_config line 50: Applying options for *
debug1: Connecting to lcomp6 [10.1.1.34] port 22.
debug1: Connection established.
debug1: permanently_set_uid: 0/0
debug1: identity file /root/.ssh/identity type 0
debug1: identity file /root/.ssh/identity-cert type -1
debug1: identity file /root/.ssh/id_rsa type 1
debug1: identity file /root/.ssh/id_rsa-cert type -1
debug1: identity file /root/.ssh/id_dsa type 2
debug1: identity file /root/.ssh/id_dsa-cert type -1
debug1: identity file /root/.ssh/id_ecdsa type -1
debug1: identity file /root/.ssh/id_ecdsa-cert type -1
debug1: Remote protocol version 2.0, remote software version OpenSSH_7.2
debug1: match: OpenSSH_7.2 pat OpenSSH*
debug1: Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_6.2
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug1: kex: server->client aes128-ctr hmac-sha1-etm@xxxxxxxxxxx none
debug1: kex: client->server aes128-ctr hmac-sha1-etm@xxxxxxxxxxx none
debug1: sending SSH2_MSG_KEX_ECDH_INIT
debug1: expecting SSH2_MSG_KEX_ECDH_REPLY
debug1: Server host key: ECDSA 7e:4d:45:6f:53:d5:76:c8:24:86:67:fa:14:a5:37:42
debug1: Host 'lcomp6' is known and matches the ECDSA host key.
debug1: Found key in /root/.ssh/known_hosts:33
debug1: ssh_ecdsa_verify: signature correct
debug1: SSH2_MSG_NEWKEYS sent
debug1: expecting SSH2_MSG_NEWKEYS
debug1: SSH2_MSG_NEWKEYS received
debug1: Roaming not allowed by server
debug1: SSH2_MSG_SERVICE_REQUEST sent
debug1: SSH2_MSG_SERVICE_ACCEPT received
****USAGE WARNING****
This is a private computer system. This computer system, including all
related equipment, networks, and network devices (specifically including
Internet access) are provided only for authorized use. This computer system
may be monitored for all lawful purposes, including to ensure that its use
is authorized, for management of the system, to facilitate protection against
unauthorized access, and to verify security procedures, survivability, and
operational security. Monitoring includes active attacks by authorized
entities
to test or verify the security of this system. During monitoring, information
may be examined, recorded, copied and used for authorized purposes. All
information, including personal information, placed or sent over this system
may be monitored.
Use of this computer system, authorized or unauthorized, constitutes consent
to monitoring of this system. Unauthorized use may subject you to criminal
prosecution. Evidence of unauthorized use collected during monitoring may be
used for administrative, criminal, or other adverse action. Use of this system
constitutes consent to monitoring for these purposes.
debug1: Authentications that can continue:
publickey,password,keyboard-interactive
debug1: Next authentication method: publickey
debug1: Offering RSA public key: /root/.ssh/id_rsa
Connection closed by 10.1.1.34
[root@lou ~]#
--
users mailing list
users@xxxxxxxxxxxxxxxxxxxxxxx
To unsubscribe or change subscription options:
https://admin.fedoraproject.org/mailman/listinfo/users
Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct
Guidelines: http://fedoraproject.org/wiki/Mailing_list_guidelines
Have a question? Ask away: http://ask.fedoraproject.org
Mark Haney ::: Senior Systems Engineer
VIF International EducationP.O. Box 3566 ::: Chapel Hill, N.C. 27515 ::: USA
-- users mailing list users@xxxxxxxxxxxxxxxxxxxxxxx To unsubscribe or change subscription options: https://admin.fedoraproject.org/mailman/listinfo/users Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct Guidelines: http://fedoraproject.org/wiki/Mailing_list_guidelines Have a question? Ask away: http://ask.fedoraproject.org