Home Tags SFTP

Tag: SFTP

RHBA-2017:0068-1: lftp bug fix update

Updated lftp packages that fix one bug are now available for Red Hat EnterpriseLinux 7. LFTP is a file transfer utility for File Transfer Protocol (FTP), Secure FileTransfer Protocol (SFTP), Hypertext Transfer Protocol (HTTP), and other commonlyused protocols. It uses the readline library for input, and provides support forbookmarks, built-in monitoring, job control, and parallel transfer of multiplefiles at the same time.This update fixes the following bug:* Previously, when mirroring files with the lftp utility over SFTP, lftpsometimes received EOF from SSH before it was able to flush the rest of the databuffer. As a consequence, the last data packet was lost. This update adds acondition to ensure that if there is some data left in the buffer in thedescribed situation, the data is safely passed to the internal buffer. As aresult, data packets are no longer lost in the described scenario. (BZ#1392944)Users of lftp are advised to upgrade to these updated packages, which fix thisbug. Before applying this update, make sure all previously released errata relevantto your system have been applied.For details on how to apply this update, refer to:https://access.redhat.com/articles/11258Red Hat Enterprise Linux Desktop (v. 7) SRPMS: lftp-4.4.8-8.el7_3.2.src.rpm     MD5: 32b2fdf953c0e1a6463185b24b87953eSHA-256: f83a8f962c00fe8b4b357d15553fec8b8570b458cad649ea85dfd5106bbc3770   x86_64: lftp-4.4.8-8.el7_3.2.i686.rpm     MD5: 7dac04214f0cc5fb942ee79ae9cdba7cSHA-256: cf34037dc04a8758b906fda491361501c6d53bcdc842d45512faac889cf2ac44 lftp-4.4.8-8.el7_3.2.x86_64.rpm     MD5: 0b652348f2bd3dfe1eab2ecc91993d94SHA-256: e4b37111e3fc9a74878efee3851a008767221f58881eefbddb49efa45f344735 lftp-debuginfo-4.4.8-8.el7_3.2.i686.rpm     MD5: ac4d066f1dcb96b1f86fdff80cddb75bSHA-256: cbb1b24d8634e201948ff37f9151c24d477aaa6aa75dfa27fc693adeac21c34f lftp-debuginfo-4.4.8-8.el7_3.2.x86_64.rpm     MD5: 03dbbaec1cff1109a04e672e9fd8784aSHA-256: 0319bbabf90cd63013f34a1e53e3e2a12377816c76d3597f761c6a2fce8093f5 lftp-scripts-4.4.8-8.el7_3.2.noarch.rpm     MD5: e79789c6edb6071e36fc6122e2f0b822SHA-256: fdfc4aa21162f78b957faaea845db97a29e5bb6e13bc4560d1c267789ff7eabf   Red Hat Enterprise Linux HPC Node (v. 7) SRPMS: lftp-4.4.8-8.el7_3.2.src.rpm     MD5: 32b2fdf953c0e1a6463185b24b87953eSHA-256: f83a8f962c00fe8b4b357d15553fec8b8570b458cad649ea85dfd5106bbc3770   x86_64: lftp-4.4.8-8.el7_3.2.i686.rpm     MD5: 7dac04214f0cc5fb942ee79ae9cdba7cSHA-256: cf34037dc04a8758b906fda491361501c6d53bcdc842d45512faac889cf2ac44 lftp-4.4.8-8.el7_3.2.x86_64.rpm     MD5: 0b652348f2bd3dfe1eab2ecc91993d94SHA-256: e4b37111e3fc9a74878efee3851a008767221f58881eefbddb49efa45f344735 lftp-debuginfo-4.4.8-8.el7_3.2.i686.rpm     MD5: ac4d066f1dcb96b1f86fdff80cddb75bSHA-256: cbb1b24d8634e201948ff37f9151c24d477aaa6aa75dfa27fc693adeac21c34f lftp-debuginfo-4.4.8-8.el7_3.2.x86_64.rpm     MD5: 03dbbaec1cff1109a04e672e9fd8784aSHA-256: 0319bbabf90cd63013f34a1e53e3e2a12377816c76d3597f761c6a2fce8093f5 lftp-scripts-4.4.8-8.el7_3.2.noarch.rpm     MD5: e79789c6edb6071e36fc6122e2f0b822SHA-256: fdfc4aa21162f78b957faaea845db97a29e5bb6e13bc4560d1c267789ff7eabf   Red Hat Enterprise Linux Server (v. 7) SRPMS: lftp-4.4.8-8.el7_3.2.src.rpm     MD5: 32b2fdf953c0e1a6463185b24b87953eSHA-256: f83a8f962c00fe8b4b357d15553fec8b8570b458cad649ea85dfd5106bbc3770   PPC: lftp-4.4.8-8.el7_3.2.ppc.rpm     MD5: 0d4e3899c45f7719a796e935ac9bec69SHA-256: 79c7fe8f24f7f10360541453a1f554f542d66d36d704a1f9e16b62e33805208e lftp-4.4.8-8.el7_3.2.ppc64.rpm     MD5: ef5ea105c9a7d01cc3c60ba89b984665SHA-256: efe7d81120d54733bc2d747a28fc15f8f590d05c140dd407ddb8cb722928a1ef lftp-debuginfo-4.4.8-8.el7_3.2.ppc.rpm     MD5: 27609feea0968a8b3b199470b3066f2fSHA-256: 14433614d5ecc5c87fa468300d79f524de735251c4642f33119aa413dac3fc73 lftp-debuginfo-4.4.8-8.el7_3.2.ppc64.rpm     MD5: 0746383af9ca3e9bc857a6ed300ab93cSHA-256: c31d9b8fd7a957714620292aeea8333b33ea6fb93d481e5a5f8f4307f5d0b47e lftp-scripts-4.4.8-8.el7_3.2.noarch.rpm     MD5: e79789c6edb6071e36fc6122e2f0b822SHA-256: fdfc4aa21162f78b957faaea845db97a29e5bb6e13bc4560d1c267789ff7eabf   PPC64LE: lftp-4.4.8-8.el7_3.2.ppc64le.rpm     MD5: 41f78266bd3d2ded60aad498296be9aaSHA-256: 437ac914567957cc645999b225181a291b472d8c283e16cea4c1f08aad6ad3a5 lftp-debuginfo-4.4.8-8.el7_3.2.ppc64le.rpm     MD5: c85f2d06b56520fd9d5de9b3ca7586ccSHA-256: bffae09d2b914f3d8b3d94b5478b39fe2bc83a85bcdc637d9698137fe5631d9b lftp-scripts-4.4.8-8.el7_3.2.noarch.rpm     MD5: e79789c6edb6071e36fc6122e2f0b822SHA-256: fdfc4aa21162f78b957faaea845db97a29e5bb6e13bc4560d1c267789ff7eabf   s390x: lftp-4.4.8-8.el7_3.2.s390.rpm     MD5: 2905cc336f49952d5ec21b8f0a0d0a0aSHA-256: da31820175d36b798be6830daf87f329dfd949f5da413dcc6043bccb1a8f3787 lftp-4.4.8-8.el7_3.2.s390x.rpm     MD5: 0d39a9c0b5bdf8deaa168b2d4d499a73SHA-256: 8f9ce2ef8ac5e871b6c0b7504baf50369ec8fcc5a58773fafe4d2719ae6b4a64 lftp-debuginfo-4.4.8-8.el7_3.2.s390.rpm     MD5: 4c9767cd4de6e4eb9b02c39cb4a21466SHA-256: 8186d99f918622bae44cb3c3672e159d4b187ae02d78ebe40e767c1ea1e52a99 lftp-debuginfo-4.4.8-8.el7_3.2.s390x.rpm     MD5: 7b81e54713b1eea893fb0a70b1d37913SHA-256: bf80c5b99f0bcc65848e095f5484661dc5181d81d23c3ee9ef7851181ed3802a lftp-scripts-4.4.8-8.el7_3.2.noarch.rpm     MD5: e79789c6edb6071e36fc6122e2f0b822SHA-256: fdfc4aa21162f78b957faaea845db97a29e5bb6e13bc4560d1c267789ff7eabf   x86_64: lftp-4.4.8-8.el7_3.2.i686.rpm     MD5: 7dac04214f0cc5fb942ee79ae9cdba7cSHA-256: cf34037dc04a8758b906fda491361501c6d53bcdc842d45512faac889cf2ac44 lftp-4.4.8-8.el7_3.2.x86_64.rpm     MD5: 0b652348f2bd3dfe1eab2ecc91993d94SHA-256: e4b37111e3fc9a74878efee3851a008767221f58881eefbddb49efa45f344735 lftp-debuginfo-4.4.8-8.el7_3.2.i686.rpm     MD5: ac4d066f1dcb96b1f86fdff80cddb75bSHA-256: cbb1b24d8634e201948ff37f9151c24d477aaa6aa75dfa27fc693adeac21c34f lftp-debuginfo-4.4.8-8.el7_3.2.x86_64.rpm     MD5: 03dbbaec1cff1109a04e672e9fd8784aSHA-256: 0319bbabf90cd63013f34a1e53e3e2a12377816c76d3597f761c6a2fce8093f5 lftp-scripts-4.4.8-8.el7_3.2.noarch.rpm     MD5: e79789c6edb6071e36fc6122e2f0b822SHA-256: fdfc4aa21162f78b957faaea845db97a29e5bb6e13bc4560d1c267789ff7eabf   Red Hat Enterprise Linux Server TUS (v. 7.3) SRPMS: lftp-4.4.8-8.el7_3.2.src.rpm     MD5: 32b2fdf953c0e1a6463185b24b87953eSHA-256: f83a8f962c00fe8b4b357d15553fec8b8570b458cad649ea85dfd5106bbc3770   x86_64: lftp-4.4.8-8.el7_3.2.i686.rpm     MD5: 7dac04214f0cc5fb942ee79ae9cdba7cSHA-256: cf34037dc04a8758b906fda491361501c6d53bcdc842d45512faac889cf2ac44 lftp-4.4.8-8.el7_3.2.x86_64.rpm     MD5: 0b652348f2bd3dfe1eab2ecc91993d94SHA-256: e4b37111e3fc9a74878efee3851a008767221f58881eefbddb49efa45f344735 lftp-debuginfo-4.4.8-8.el7_3.2.i686.rpm     MD5: ac4d066f1dcb96b1f86fdff80cddb75bSHA-256: cbb1b24d8634e201948ff37f9151c24d477aaa6aa75dfa27fc693adeac21c34f lftp-debuginfo-4.4.8-8.el7_3.2.x86_64.rpm     MD5: 03dbbaec1cff1109a04e672e9fd8784aSHA-256: 0319bbabf90cd63013f34a1e53e3e2a12377816c76d3597f761c6a2fce8093f5 lftp-scripts-4.4.8-8.el7_3.2.noarch.rpm     MD5: e79789c6edb6071e36fc6122e2f0b822SHA-256: fdfc4aa21162f78b957faaea845db97a29e5bb6e13bc4560d1c267789ff7eabf   Red Hat Enterprise Linux Workstation (v. 7) SRPMS: lftp-4.4.8-8.el7_3.2.src.rpm     MD5: 32b2fdf953c0e1a6463185b24b87953eSHA-256: f83a8f962c00fe8b4b357d15553fec8b8570b458cad649ea85dfd5106bbc3770   x86_64: lftp-4.4.8-8.el7_3.2.i686.rpm     MD5: 7dac04214f0cc5fb942ee79ae9cdba7cSHA-256: cf34037dc04a8758b906fda491361501c6d53bcdc842d45512faac889cf2ac44 lftp-4.4.8-8.el7_3.2.x86_64.rpm     MD5: 0b652348f2bd3dfe1eab2ecc91993d94SHA-256: e4b37111e3fc9a74878efee3851a008767221f58881eefbddb49efa45f344735 lftp-debuginfo-4.4.8-8.el7_3.2.i686.rpm     MD5: ac4d066f1dcb96b1f86fdff80cddb75bSHA-256: cbb1b24d8634e201948ff37f9151c24d477aaa6aa75dfa27fc693adeac21c34f lftp-debuginfo-4.4.8-8.el7_3.2.x86_64.rpm     MD5: 03dbbaec1cff1109a04e672e9fd8784aSHA-256: 0319bbabf90cd63013f34a1e53e3e2a12377816c76d3597f761c6a2fce8093f5 lftp-scripts-4.4.8-8.el7_3.2.noarch.rpm     MD5: e79789c6edb6071e36fc6122e2f0b822SHA-256: fdfc4aa21162f78b957faaea845db97a29e5bb6e13bc4560d1c267789ff7eabf   (The unlinked packages above are only available from the Red Hat Network) These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

Ipswitch MOVEit® 2017 Offers New Levels of Compliance Support in Secure...

New Features Added to Managed File Transfer Products Help IT Teams Protect Data When Most VulnerableLondon, UK. 11th October, 2016 – Ipswitch, the leader in easy to try, buy and use IT management software, today announced MOVEit® 2017 – the combined release includes new versions of its industry leading Managed File Transfer products MOVEit® Transfer, MOVEit® Automation and Ipswitch® Analytics.

These new releases significantly enhance the ability of IT teams to ensure the secure exchange of sensitive data with external partners on a global scale, and in compliance with data protection regulations such as HIPAA, PCI and GDPR. Ipswitch MOVEit 2017 In our information-based economy, the daily exchange of data with external organisations has become a core process of businesses across a large number of industries. Healthcare providers and Insurers routinely share Protected Health Information (PHI) between themselves and regulatory agencies. Retailers and Financial institutions transmit payment card data. Organisations in multiple industries routinely exchange Personally Identifiable Information (PII).

All of this data is protected by regulations such as HIPAA (Health Insurance Portability and Accountability Act), PCI DSS (Payment Card Industry Data Security Standard), GDPR (the European Union’s General Data Protection Regulation) and others. PHI, PII and payment card data are the target of global cybercriminal activity. MOVEit® helps safeguard that data when it is most vulnerable – in transit, as well as when the data is at rest, with best in class encryption. Ipswitch’s industry leading MOVEit® products help IT teams ensure these exchanges are secure, in compliance with data protection regulations, and automated to reduce IT overhead costs and meet internal and external Service Level Agreements (SLAs). MOVEit Transfer 2017 provides enhanced language support and improvements to its user interface. MOVEit users can now externally transfer files in any language (including support for Japanese and Simplified Chinese) to anywhere in the world securely and in compliance with multiple data protection regulations. MOVEit Automation 2017 includes new features that significantly extend IT team’s ability to automate core data exchange processes at high volumes while continuing to meet SLAs and reduce IT costs.

These include improvements to its state-of-the-art web admin interface, the ability to manage files and resources in any language and SOCKS proxy support for SFTP hosts. Ipswitch Analytics 2017 enables SLA and compliance reporting with new advanced data filters, and enhanced management of security keys, licenses and agents.

Additionally, Ipswitch Analytics provides new agents for Microsoft Exchange that extend IT teams’ visibility to include data transfers that occur through email.

This significantly enhances the organisations ability to assure regulatory compliance by providing first time visibility into an area of increasing concern – ad hoc file transmissions of sensitive data by employees. “With many organisations implementing security policies to restrict manual file transfers, IT teams need a flexible, IT-approved solution that provides the ease-of-use that today’s employees crave combined with the security IT teams demand for protection and compliance,” said Austin O’Malley, Chief Product Officer at Ipswitch. “Thousands of companies in some of the most data-sensitive industries are using MOVEit 2017 to better manage data exchange processes from a central console that is understandable and easy-to-use.” EditionsTo make it easier for IT teams to buy a solution that meets their exact requirements while increasing the value they receive from their investment, MOVEit Transfer 2017 and MOVEit Automation 2017 are offered in Standard, Professional and Premium editions. MOVEit Automation 2017 is also offered in an additional edition, Basic, which is ideal for small businesses. All MOVEit 2017 solutions – MOVEit Transfer, MOVEit Automation, Ipswitch Analytics and Ipswitch Gateway – are combined in the comprehensive MOVEit Complete package, which simplifies IT teams’ Managed File Transfer needs in Standard, Professional and Premium editions as well. MOVEit has been reliably and predictably transferring files for thousands of customers and millions of users across several vertical industries – including banking, financial services, insurance, healthcare and retail.

To learn more about MOVEit 2017, visit https://www.ipswitch.com/secure-information-and-file-transfer/moveit-mft-complete. END About IpswitchToday’s hard-working IT teams are relied upon to manage increasing complexity and deliver near-zero downtime.
Ipswitch IT and network management software helps them succeed by enabling secure control of business transactions, applications and infrastructure.
Ipswitch software is powerful, flexible and easy to try, buy and use.

The company’s software helps teams shine by delivering 24/7 performance and security across cloud, virtual and network environments.
Ipswitch Unified Infrastructure and Applications Monitoring software provides end-to-end insight, is extremely flexible and simple to deploy.

The company’s Information Security and Managed File Transfer solutions enable secure, automated and compliant business transactions and file transfers for millions of users.
Ipswitch powers more than 150,000 networks spanning 168 countries, and is based in Lexington, Mass., with offices throughout the U.S., Europe, Asia and Latin America.

For more information, please visit http://www.ipswitch.com/, or connect with us on LinkedIn and Twitter. Media Contact:Rebecca Orr or Richard WolfeTOUCHDOWNPROffice: +44 (0) 1252 717 040ipswitch@touchdownpr.com

Logins for US Navy, NASA’s JPL among of US gov logins...

Just US$2132 gets you half a dozen live Navy.mil accounts. Hackers are claiming to have accounts at major United States government agencies for sale, including NASA, the Navy, and the Department of Veteran Affairs. The unverified cache found by Infoarmor chief intelligence officer Andrew Komarov includes 33,000 records tied to the US Government, plus research and educational organisations and universities. Agencies on the list include the US General Services Administration, National Parks Service, and the Federal Aviation Administration. One government data listing visited by The Register promised alleged access to six unnamed accounts for subdomains of the US Navy including 3.5 bitcoins (US$2132). They are also selling alleged access to five accounts across subdomains for NASA's Jet Propulsion Lab for three bitcoins (US$1827). Another three logins to servers of the US Centres of Disease Control and Prevention over FTP and SFTP were being flogged for half a Bitcoin (US$300). Komarov says the data was likely stolen from the National Institute of Building Sciences. "After a thorough analysis, it was determined that most of this data was accessed from the hacked National Institute of Building Sciences website," Komarov says [PDF]. "It contains numerous members from the research, educational, government and military community." One of the sellers, known as "poporet", is selling a revamped trojan that targets US bureaucrats and could be behind the rash of purported Government data dumps. The remote access trojans known as GovRAT has been overhauled and is being sold for a relatively cheap price of up to US$6000 for source code, and US$1000 for basic components. "The dynamics of growth show an extreme interest in hi-tech, scientific and federal sectors, Komarov says. The trend is also very visible regarding defence and military employees". GovRAT has also been upgraded with various anti-analysis and anti-security techniques. ®

Cisco patches critical exposure in management software

Cisco has patched what it called a critical vulnerability in its Unified Computing System (UCS) Performance Manager software that could let an authenticated, remote attacker execute commands. Cisco UCS Performance Manager versions 2.0.0 and prior are a...

Cisco patches serious flaws in router and conferencing server software

Cisco Systems released patches this week for several vulnerabilities in its IOS software for networking devices and the Cisco and WebEx conferencing servers. The most serious vulnerability affects the Cisco IOS XR software for the Cisco Network Converg...