📄 trouble.txt
字号:
trouble.txtTroubleshooting info for the SafeTP server +-----------------------------------------------------------+ | | | Note: This file is now quite out of date. The up-to-date | | version of this information can be found at: | | | | http://safetp.cs.berkeley.edu/trouble.html | | | +-----------------------------------------------------------+1 "warning: The random seed file is missing. Creating a new onenow."Context: Running sftpd or sftpc. Message is printed to console, orwritten to syslog (sftpd only).Cause: This is printed when the file "randomSeed" is missing (orcannot be accessed by the logged-in user). It is normally createdduring key generation.Solution: Run 'makekeys'. For sftpd (server), follow instructions ininstall.txt, manual install, section 1.3. For sftpc (client), do this: % makekeys 1024 02 "Exception: Assertion failed: LoadKey for ElGamal/public.keyfailed ..."Context: Running sftpc (from command line).Cause: The client keys have not been created, or are not accessible.Solution: Run 'makekeys'. See above (problem 1).3 "510 Assertion failed: LoadKey for DSA/public.key failed, ..."Context: This message may be returned by sftpd, in the FTP protocolstream, such that the client will see this message.Cause(1): The DSA keys have not been created.Solution: Run 'makekeys' (see section 1.3).Cause(2): The DSA subdirectory is not accessible to sftpd (usually thesafetp user).Solution: chmod or chown the DSA subdirectory so sftpd will have readaccess.Cause(3): The '-y' switch has been used, its argument may be incorrect(the argument should be a directory, of which "DSA" is a subdirectory,and contains the DSA keys).Solution: Fix the argument to '-y'. This is in inetd.conf, on theline where sftpd is listed.4 "failed to write key to DSA/private.key"Context: This message is printed to the console by makekeys.Cause and Solution: See 3, cause (2).5 "510 connect: Connection refused (code 146)"Context: Client tries to connect to server, message is returned inprotocol stream.Cause(1): The server is misconfigured; this message results from sftpdtrying, and failing, to contact ftpd. sftpd obtains the port on whichto contact ftpd from /etc/services, querying the name "raw-ftp",unless it has been set with the "-f" switch. ftpd is started byinetd, and should be set to start in response to contact on the"raw-ftp" port.Solution: Fix /etc/inetd.conf or /etc/services.Cause(2): Inetd has not received the HUP signal.Solution: Send inetd the HUP signal. (See kill(1) for more info.)6 "500 You've GOT to be joking."Context: Reported by ftpd, and relayed by sftpd, to ftp client, in responseto a PORT protocol command.Cause: ftpd is configured to not allow non-reflexive PORT commands(i.e., third-party transfers; when data encryption is off, sftpd worksby emulating a third-party transfer between ftpd and the client).Data encryption is off, so sftpd does not intercept PORT commands,instead letting ftpd and the client communicate directly.Solution(1): Enable 3rd-party transfer in ftpd. This may require arecompile of ftpd.Solution(2): Set the -3 switch for the server, in /etc/inetd.conf.Remember to HUP inetd to get the change to take effect. This has thedisadvantage of relaying all data traffic through sftpd (a performancehit), even when it is not being encrypted.Solution(3): Turn on data encryption in the client. This will forcesftpd to intercept all data transmissions, pacifying ftpd.
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -