Don't use plain FTP. Use sftp. Plain FTP should have died out by 2002. There are so many reasons for this.
Every networked OS has great sftp clients. Use ssh-keys if you can for authentication, they are 1,000,000x more secure than passwords. Every Linux file manager supports drag-n-drop sftp connections. Just use sftp:// in the URL. This assumes the ssh client is installed.
The commands for sftp match exactly the commands for plain FTP, so if there is another program making the calls, you just need to link or alias sftp into ftp.
Google found this:
https://www.digitalocean.com/communi...n-ubuntu-16-04
https://www.digitalocean.com/communi...n-ubuntu-18-04
File permissions are the center of all Unix security. You'll need to learn those, ASAP! Web search of "unix permissions" will find a number of tutorials for file & directory permissions across all Unix-like OSes. Every popular OS in the world uses this model except 1.
To setup ssh-keys between 2 Unix computers is just 2 commands total, run on the client:
Code:
ssh-keygen -t ed25519
ssh-copy-id -i ~/.ssh/id_ed25519.pub userid@remote
swap out the userid@remote for your username on the server and "remote" for either the DNS name or IP address of the server. Nobody is hacking ed25519 today that has been reported anywhere. These keys are used for every ssh, scp, sftp, rsync, sshfs, rdiff-backup, and 50 other ssh-enabled tools.
To reuse the same key with a different server, run the ssh-copy-id command at the new server.
Bookmarks