Table of Contents

Search

  1. Preface
  2. Introduction
  3. Dashboard
  4. Resources
  5. Workflows
  6. Task Reference
  7. Services Overview
  8. Users
  9. Logs and Reports
  10. Encryption
  11. System
  12. Appendix
  13. Glossary Terms

SFTP Service (FTP over SSH)

SFTP Service (FTP over SSH)

The traditional FTP protocol sends cleartext commands and data over the network. The data could be intercepted, viewed, and altered by an attacker before sending it to the receiver. 
If you send sensitive data over the network, you might want to consider the SFTP protocol for securing data.
SFTP creates an encrypted tunnel between two computer systems and protects against the following attacks:
  • IP spoofing, where a remote host sends out packets that pretend to come from a trusted host
  • IP source routing, where a host can pretend that an IP packet comes from another trusted host
  • DNS spoofing, where an attacker forges the name server records
  • Interception of cleartext passwords and other data by intermediate hosts
  • Manipulation of data by attackers in control of intermediate hosts
SFTP uses a combination of asymmetric cryptology and symmetric cryptology to provide a strong encryption and optimal performance.  
SFTP is supported by most commercial servers and many open source servers, for example, Linux.  SFTP can be used for transmitting large files because SFTP compresses the data stream prior to encryption.
Managed File Transfer implements the most current SSH 2.0 protocol standard.

0 COMMENTS

We’d like to hear from you!