secure ftp client for linux

Posted on 2004-11-15
Last Modified: 2013-11-29
What is a good if not the best secure ftp client for linux and Unix?  I am looking the one which  uses or accept certificates- and can do so in a command line scripting mode.   If it also has GUI capabiliites that is OK but what i want to achieve is unattended scripting.  Any help with setup will be most appreciated. this is why i labeled moderately difficult at 125 points.  Thanks
Question by:shrek2
    LVL 13

    Accepted Solution

    There are multiple COMMERCIAL solutions for this, but one solid recommendations that lends itself to linux, is FREE, and supports multiple security methods of CKERMIT.

    While "kermit" is also its own file transfer protocol, it DOES have ftp capabilities built in as well.       There is tons of documentation on the kermit web site, and the kermit line has been actively maintained for DECADES.

    LVL 34

    Assisted Solution

    OpenSSH ( also includes an sftp (Secure FTP) client.

    Assisted Solution

    Most flavors of linux come with a utility called scp, this is a file transfer that is based off of ssh. It has a CLI so you can incorporate it into your scripts.

    this is taken from the scp man page:

         scp - secure copy (remote file copy program)

         scp [-pqrvC46] [-S program] [-P port] [-c cipher] [-i identity_file]
             [-o option] [[user@]host1:]file1 [...] [[user@]host2:]file2

         scp copies files between hosts on a network.  It uses ssh(1) for data
         transfer, and uses the same authentication and provides the same security
         as ssh(1).  Unlike rcp(1), scp will ask for passwords or passphrases if
         they are needed for authentication.

         Any file name may contain a host and user specification to indicate that
         the file is to be copied to/from that host.  Copies between two remote
         hosts are permitted.
    LVL 34

    Expert Comment

    Split is fine with me.

    Featured Post

    Why You Should Analyze Threat Actor TTPs

    After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

    Join & Write a Comment

    The purpose of this article is to fix the unknown display problem in Linux Mint operating system. After installing the OS if you see Display monitor is not recognized then we can install "MESA" utilities to fix this problem or we can install additio…
    This is the first one of a series of articles I’ll be writing to address technical issues that are always referred to as network problems. The network boundaries have changed, therefore having an understanding of how each piece in the network  puzzl…
    After creating this article (, I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
    Get a first impression of how PRTG looks and learn how it works.   This video is a short introduction to PRTG, as an initial overview or as a quick start for new PRTG users.

    755 members asked questions and received personalized solutions in the past 7 days.

    Join the community of 500,000 technology professionals and ask your questions.

    Join & Ask a Question

    Need Help in Real-Time?

    Connect with top rated Experts

    26 Experts available now in Live!

    Get 1:1 Help Now