Documentation forServ-U File Server

SSH Options

FTP Voyager supports two different methods for authentication via SFTP over SSH2. The first, and most common method, is password-based authentication. This is the same method used by FTP, and involves sending a username and a secret password to a server to log in. However, SFTP supports a special method called Public Key Authentication that involves sending a username and a secret "key" to the server to log in, instead. This key uniquely identifies the user, and can be used across multiple servers.

You must override the setting below to begin using the SSH Options page for this site profile:

Use Global Settings
Select Use these settings to override the settings that are defined in the SSH Options category within the Options dialog.

Options pertaining to this page are described below:

Use compression This option enables compression in SFTP, reducing overall bandwidth usage. Compression is enabled by default, and is recommended.
Use password authentication This option enables password-based authentication to the server, which is the default in most situations. This option is typically disabled if public key authentication is in use, although some servers require both a password and a public key.
Use public key authentication This option enables public key-based authentication to the server. This option is typically disabled if password-based authentication is in use, although some servers require both a password and a public key.
Private Key The private key identifying the user account on the server, typically represented as a .key file.
Public Key The public key associated with the private key, typically represented as a .pub file.
Use Private Key Password If the private key is protected by a password, it must be typed in the Password and Confirm Password fields.
SSH Ciphers

FTP Voyager can be configured to use specific SSH ciphers out of the full suite of supported SSH ciphers. It can also be configured to change the order in which SSH ciphers are negotiated with the SFTP server. An SSH cipher is the specific mathematical algorithm that is used to encrypt and decrypt the data. By default, all SSH ciphers are enabled in the order below:

  • AES-128-CBC
  • Triple DES (3DES)
  • Blowfish
  • AES-192-CBC
  • AES-256-CBC
  • CAST-128
  • AES-128-CTR
  • AES-192-CTR
  • AES-256-CTR
  • CBC
SSH MACs

In SSH2, MACs are used to perform integrity verification on data packets as they are sent and received between the client and server. FTP Voyager and the SFTP server will perform integrity checking on each packet using the MAC selected by the server and the client from the list. Individual MACs can be enabled or disabled, and the order of preference can be changed. The default MACs are enabled in the order below:

  • SHA1
  • SHA1 96
  • SHA2 256
  • SHA2 256-96
  • SHA2 512
  • SHA2 512-96
  • MD5
Creating Key Pairs FTP Voyager supports creation of key pairs using the Create New Key Pair Files button. For more information, see the Create SSH Key Pairs dialog.