Remote Access and Secure Shell

After Windows->UNIX SSH File Transfer, how do I remove the extra carriage returns from my file?

Use dos2unix to convert each transferred text file from DOS format to ISO format. For example, to remove the extra carriage returns from original_file, yielding converted_file: 
% dos2unix original_file converted_file 

In the past, when you used ftp to transfer files, you didn't have to do this conversion, because ftp did it for you. Secure ftp (sftp) does binary-binary transfers only (in the interest of security), so you must perform the conversion. 

Using Secure Shell File Transfer, how do I see more than just the files under my home directory on the remote machine?

On your local machine (Windows), across the top of the Secure Shell File Transfer window, there is a row of menu items that says "File Edit View Operation".

Click the "View" item. This will cause a drop-down menu to appear.

In that menu, click the box to the left of "Show Root Directory" or "View Root Directory/Files".

This will cause the tree view of the remote file system (on the left side of the window) to change, giving you a view of all of the remote machine's files, starting with "/" (the root directory) at the top of the tree.

How do I install and use secure FTP?

There is a secure equivalent of ftp on UNIX, Linux, MacOS, and Windows.

On Windows, click the yellow Secure File Transfer icon on your desktop, which 
appeared after you downloaded and installed Secure Shell.

On UNIX, the secure commnd-line equivalent of ftp is called sftp.

On Mac PCs, use command-line sftp or download and install Fugu.

On Linux, command-line sftp should already be installed and in your default path.

How do I download and install SSH on my Windows Machine?

To download, install, and test Secure Shell, perform the following steps on your Windows PC.

1) Check if Secure Shell is already installed on your PC, as follows:

Click "Start" (lower left corner of the screen). Click "Control Panel" Select "Add/Remove Programs" Scan the list of installed programs. You might need to scroll.

If Secure Shell is listed, proceed to step 4. Otherwise, proceed to step 2.

2) Copy the Secure Shell package to your Windows PC, as follows:

How do I access LPL computers/systems from outside of the network?

Internet access to LPL is available only through Secure Shell (telnet is not permitted). Click here for information on configuring your system for Secure Shell (SSH) access to LPL: LCS SSH FAQ.

If you need to access LPL email from remote sites, the Secure LPL WebMail System is a convenient option. If you have an LPL computer login account, then you can access Secure LPL WebMail. Click here to access the system: LPL WebMail Home.

How do I use Secure Shell Transfer on my Win PC?

double-click on the yellow folder icon
click Quick Connect
fill in the fields as follows:
Host Name:
User Name: yourusername
click Connect
click Yes if prompted
type your LPL password
you will get a GUI interface showing the files/dirs under your LPL home directory
to upload a file:
click on the Up Arrow button in the middle of the horizontal row of buttons
that runs across the top of the window, just below File Edit View...

How do I access LPL's public ftp (anonymous ftp) site?

Click here to access the LPL public ftp site: LPL FTP Site

You can download files from the site by going to pub/lpl/. If you are using a browser to download, click the file of your choice to start the download. If you are using a command -line window to connect to the ftp site, login to shell with your LPL credentials, cd /ftp/pub/lpl/, and use the "get" command to download a file.

If you would like to create a directory from which the public may download files, please contact LCS Support.

How do I set up unchallenged Secure Shell (SSH) access?

The most secure method of unchallenged SSH authentication is to use RSA/DSA keys with authentication agents.  SSH agents give another host secure access to your private keys as if it were local, permitting you to ssh, sftp, or scp using your private keys for authentication, without typing a password.

A less secure method is to use RSA/DSA keys without agents. To do this, follow the instructions below, but enter no passphrase when prompted (just press enter/return), and skip Phase II.

Unchallenged SSH access using agents is set up in two phases:

Subscribe to RSS - Remote Access and Secure Shell