Insecure File Transfer Protocol

[Releases]
Clone this repo:

Branches

  1. 93c3c03 Update ssh-to-nc wrapper by WHR · 5 years ago master
  2. 2f16011 Update README.md to add sshfs(1) usage by WHR · 7 years ago
  3. cd70e15 Update README.md by Low-power · 7 years ago
  4. 16cfe14 Put this dirty hack to git by WHR · 7 years ago

Use the Secure File Transfer Protocol, originally a sub-protocol of the Secure Shell (SSH) protocol, as a standalone protocol that established directly on TCP instead of SSH.

This FTP server / client is really simple; it doesn't have any encryption and authentication stuff.

Based on the SFTP implementation in OpenSSH, specifically sftp(1) and sftp-server(8).

Dependencies

Server depends on xinetd(8) and sftp-server(8) (OpenSSH). Client depends on nc(1) and sftp(1) (OpenSSH).

Usage

Setup the server by deploy the provided xinetd configuration file, modify it to fit your needs, then restart xinetd. In the client, deploy file sftp-ssh-to-nc.sh to some where you could easily find or under the PATH; connect to server using sftp -S <path/to/sftp-ssh-to-nc.sh> [-P <port>] <server-address>.

Alternately, the sshfs(1) can also be used as client; mounting from the nsftp server is possible via sshfs <server-address>:<path> <mount-point> -o directport=<port>.