I routinely copy files to/from Windows to my Linux boxes, and the best way I've found is either use Dolphin and smb:// or use samba client from the command line. Getting SSH/SCP/SFTP to work on Windows isn't trivial (at least it hasn't been) so I just skip that effort altogether. Another method I've used it to share an external USB drive and use USB Anywhere to connect the Windows box to it. Windows SSH support astonishingly still sucks badly so I don't bother trying to use that method.
On Tue, Mar 22, 2016 at 8:27 AM, Gary Stainburn < gary.stainb...@ringways.co.uk> wrote: > I need a way to rebustly copy files from a Fedora server to a Windows box. > As > my usual environment is Linux by first thought was SCP, using Perl and > Net::SCP. > > I first tried an OpenSSH install from the WinSCP site and had managed to > connec to the Windows box using passwords, but could not get public keys to > work either way. > > I then downloaded OpenSSH for Windows using the installer found at > http://www.mls-software.com/opensshd.html > > Using this setup I can ssh from the Windows box to my Fedora server and it > logs in successfully using keys. However, I still cannot connect from > Fedora > to Windows. > > Oddly, I do get the banner.txt file appear in the login attempt. > Also oddly, the attemp doesn't drop down to passwords when the keys fail > even > though it has > > PasswordAuthentication yes > > in sshd_config. Can anyone suggest what I try next. Below is the terminal > session from the Fedora box. > > [root@lou ~]# gvim .ssh/authorized_keys > [root@lou ~]# ssh -v -l Administrator lcomp6 > OpenSSH_6.2p2, OpenSSL 1.0.1e-fips 11 Feb 2013 > debug1: Reading configuration data /etc/ssh/ssh_config > debug1: /etc/ssh/ssh_config line 50: Applying options for * > debug1: Connecting to lcomp6 [10.1.1.34] port 22. > debug1: Connection established. > debug1: permanently_set_uid: 0/0 > debug1: identity file /root/.ssh/identity type 0 > debug1: identity file /root/.ssh/identity-cert type -1 > debug1: identity file /root/.ssh/id_rsa type 1 > debug1: identity file /root/.ssh/id_rsa-cert type -1 > debug1: identity file /root/.ssh/id_dsa type 2 > debug1: identity file /root/.ssh/id_dsa-cert type -1 > debug1: identity file /root/.ssh/id_ecdsa type -1 > debug1: identity file /root/.ssh/id_ecdsa-cert type -1 > debug1: Remote protocol version 2.0, remote software version OpenSSH_7.2 > debug1: match: OpenSSH_7.2 pat OpenSSH* > debug1: Enabling compatibility mode for protocol 2.0 > debug1: Local version string SSH-2.0-OpenSSH_6.2 > debug1: SSH2_MSG_KEXINIT sent > debug1: SSH2_MSG_KEXINIT received > debug1: kex: server->client aes128-ctr hmac-sha1-...@openssh.com none > debug1: kex: client->server aes128-ctr hmac-sha1-...@openssh.com none > debug1: sending SSH2_MSG_KEX_ECDH_INIT > debug1: expecting SSH2_MSG_KEX_ECDH_REPLY > debug1: Server host key: ECDSA > 7e:4d:45:6f:53:d5:76:c8:24:86:67:fa:14:a5:37:42 > debug1: Host 'lcomp6' is known and matches the ECDSA host key. > debug1: Found key in /root/.ssh/known_hosts:33 > debug1: ssh_ecdsa_verify: signature correct > debug1: SSH2_MSG_NEWKEYS sent > debug1: expecting SSH2_MSG_NEWKEYS > debug1: SSH2_MSG_NEWKEYS received > debug1: Roaming not allowed by server > debug1: SSH2_MSG_SERVICE_REQUEST sent > debug1: SSH2_MSG_SERVICE_ACCEPT received > > ****USAGE WARNING**** > > This is a private computer system. This computer system, including all > related equipment, networks, and network devices (specifically including > Internet access) are provided only for authorized use. This computer system > may be monitored for all lawful purposes, including to ensure that its use > is authorized, for management of the system, to facilitate protection > against > unauthorized access, and to verify security procedures, survivability, and > operational security. Monitoring includes active attacks by authorized > entities > to test or verify the security of this system. During monitoring, > information > may be examined, recorded, copied and used for authorized purposes. All > information, including personal information, placed or sent over this > system > may be monitored. > > Use of this computer system, authorized or unauthorized, constitutes > consent > to monitoring of this system. Unauthorized use may subject you to criminal > prosecution. Evidence of unauthorized use collected during monitoring may > be > used for administrative, criminal, or other adverse action. Use of this > system > constitutes consent to monitoring for these purposes. > > > debug1: Authentications that can continue: > publickey,password,keyboard-interactive > debug1: Next authentication method: publickey > debug1: Offering RSA public key: /root/.ssh/id_rsa > Connection closed by 10.1.1.34 > [root@lou ~]# > -- > users mailing list > users@lists.fedoraproject.org > To unsubscribe or change subscription options: > https://admin.fedoraproject.org/mailman/listinfo/users > Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct > Guidelines: http://fedoraproject.org/wiki/Mailing_list_guidelines > Have a question? Ask away: http://ask.fedoraproject.org > -- Mark Haney ::: Senior Systems Engineer *VIF* International Education P.O. Box 3566 ::: Chapel Hill, N.C. 27515 ::: USA 919-265-5006 office Global learning for all. www.vifprogram.com <http://www.vifprogram.com/?utm_source=signature&utm_medium=email&utm_campaign=VIF> Find VIF on Facebook <http://facebook.com/VIFInternationalEducation> | Twitter <https://twitter.com/vifglobaled> | LinkedIn <http://www.linkedin.com/company/vif-international-education> Recognized as a ‘Best for the World’ <http://bestfortheworld.bcorporation.net/> B Corp!
-- users mailing list users@lists.fedoraproject.org To unsubscribe or change subscription options: https://admin.fedoraproject.org/mailman/listinfo/users Fedora Code of Conduct: http://fedoraproject.org/code-of-conduct Guidelines: http://fedoraproject.org/wiki/Mailing_list_guidelines Have a question? Ask away: http://ask.fedoraproject.org