Add new attachment

Only authorized users are allowed to upload new attachments.

List of attachments

Kind Attachment Name Size Version Date Modified Author Change note
png
prefs_encryption_files.png 82.3 kB 3 17-Apr-2020 10:35 Halmágyi Árpád
png
prefs_encryption_keystore.png 19.2 kB 1 17-Apr-2020 10:35 Halmágyi Árpád
png
prefs_encryption_password.png 133.3 kB 3 17-Apr-2020 10:35 Halmágyi Árpád
png
prefs_encryption_ssl.png 132.2 kB 3 17-Apr-2020 10:35 Halmágyi Árpád

This page (revision-4) was last changed on 17-Apr-2020 10:34 by Halmágyi Árpád

This page was created on 25-Oct-2018 04:31 by Ben Spink

Only authorized users are allowed to rename pages.

Only authorized users are allowed to delete pages.

Difference between version and

At line 1 changed one line
Passwords in the user manager can either be stored in DES or SHA mode. SHA mode makes them irreversible. So neither you, nor anyone else can lookup a user's password at a later date. You can also set some restrictions on password length, and how many characters for random passwords.
Passwords in the user manager can either be stored in DES or hashed using MD5 or SHA mode. MD5/SHA mode makes them irreversible. So neither you, nor anyone else can lookup a user's password at a later date. You can also set some restrictions on password length, and how many characters for random passwords. These are enforced anytime a user changes their password as well.
At line 5 changed one line
This tab lets you configure the SSL certificate used by the server. This certificate is used for SSL FTP, and HTTPS. CrushFTP comes by default with a built in self signed certificate. Users will be warned the certificate is not trusted, but after that all data is encrypted. The potential risk is that someone could be running a rogue server using there own self signed certificate and the user wouldn't be able to tell the difference. If this risk is something you are concerned about, you can purchase a certificate from a certificate authority and pay a yearly fee to them to maintain it. You can then specify the certificate here. CrushFTP expects the certificate to be in a Java keystore file and needs the password to access the keystore. If you do nothing and leave these settings at their defaults, SSL will be working. If you make changes, be sure you do so accurately.
This tab lets you configure the SSL certificate used by the server. This certificate is used for SSL FTP, and HTTPS. CrushFTP comes by default with a built in self signed certificate. Users will be warned the certificate is not trusted, but after that all data is encrypted. CrushFTP expects the certificate to be in a Java keystore file (JKS) or pkcs12 PFX file and needs the password to access the keystore. If you do nothing and leave these settings at their defaults, SSL will be working. If you make changes, be sure you do so accurately. This is the global SSL cert, but you can also specify a SSL cert on individual HTTPS/FTPS ports. Requiring [client certificate]s will block all connections fi the browser doesn't have a client cert already installed that you provided them.
At line 9 added one line
If you already have a keystroke, you can check it's contents using the keystore tab.
At line 10 changed one line
This tab allows you to make a key file for SSH connections with SFTP. You cannot use this option when in remote admin mode. It builds a "makeKey.command" file and places it in the directory it specifies. It them tries to execute it to build the key file. Follow the directions it has in the terminal.
[attachment|prefs_encryption_keystore.png]
At line 12 removed one line
[attachment|prefs_encryption_ssh.png]
At line 14 added one line
File based encryption allows you to store files on your drive in a format that cannot be read by anything outside of CrushFTP. The files are encrypted, and are only decrypted if transferred back through CrushFTP using the same key that was used to encrypt them. As the screenshot indicates, you really need to know what you are doing if you plan to use this. If you loose your key, the files all become worthless. There is also a user manager option for this on a per user basis.
At line 15 removed 2 lines
File based encryption allows you to store files on your drive in a format that cannot be read by anything outside of CrushFTP. The files are encrypted, and are only decrypted if transferred back through CrushFTP using the same key that was used to encrypt them. As the screenshot indicates, you really need to know what you are doing if you plan to use this. If you loose your key, the files all become worthless.
Version Date Modified Size Author Changes ... Change note
4 17-Apr-2020 10:34 1.927 kB Halmágyi Árpád to previous
3 25-Oct-2018 04:31 1.793 kB Ben Spink to previous | to last
2 25-Oct-2018 04:31 1.731 kB Ben Spink to previous | to last
1 25-Oct-2018 04:31 2.082 kB Ben Spink to last
« This page (revision-4) was last changed on 17-Apr-2020 10:34 by Halmágyi Árpád
G’day (anonymous guest)
CrushFTP9 | What's New
JSPWiki