?
Solved

How to use encrypted passwords with ncftpspooler?

Posted on 2008-10-14
1
Medium Priority
?
526 Views
Last Modified: 2013-12-09
I'm using ncftpspooler to automate the sending of files from my site to another site.  This works fine as long as I use Anonymous FTP.  Unfortunately, I have a requirement that individual username and passwords be used and that the passwords cannot cross the line as plain text.  The job files display the user and pass as text, so I assume the pass would have to be the encrypted password, which would get decoded and validated on the Server?

What are my options?  The account may be virtual, if that helps.
0
Comment
Question by:sjpetrov
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 33

Accepted Solution

by:
Dave Howe earned 1600 total points
ID: 22718942
unfortunately, ftp is inherently plaintext - there are secure variants (ftps, in explicit and implicit modes; the former is an encrypted channel similar to https, the latter is similar to email TLS support) but you often find that that fails firewall traversal (as ftp is a complex protocol that needs "fixing up" for firewall traversal)

the most common secure alternative is sftp - which is file transfer over ssh. This is inherently secure (by a wide margin) and can either use username+password or username+rsa key. the unix (and/or windows puTTY) utilities for this accept command line arguments, so writing a cronned script to iterate a directory and move any files it finds would be trivial.
0

Featured Post

Cyber Threats to Small Businesses (Part 1)

This past May, Webroot surveyed more than 600 IT decision-makers at medium-sized companies to see how these small businesses perceived new threats facing their organizations.  Read what Webroot CISO, Gary Hayslip, has to say about the survey in part 1 of this 2-part blog series.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Since pre-biblical times, humans have sought ways to keep secrets, and share the secrets selectively.  This article explores the ways PHP can be used to hide and encrypt information.
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …
Suggested Courses

770 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question