Changeset 7850359 in trunk
- Timestamp:
- 2014-07-22T05:16:04Z (11 years ago)
- Branches:
- master
- Children:
- bc6304a
- Parents:
- 9947922
- File:
-
- 1 edited
Legend:
- Unmodified
- Added
- Removed
-
TabularUnified docs/frontends/FTP-and-SFTP.rst ¶
r9947922 r7850359 120 120 attacks. The code for encrypting the SFTP connection was not written by the 121 121 Tahoe-LAFS team, and we have not reviewed it as carefully as we have reviewed 122 the code for encrypting files and directories in Tahoe-LAFS itself. If you 123 can connect to the SFTP server (which is provided by the Tahoe-LAFS gateway) 124 only from a client on the same host, then you would be safe from any problem 125 with the SFTP connection security. The examples given below enforce this 126 policy by including ":interface=127.0.0.1" in the "port" option, which causes 127 the server to only accept connections from localhost. 122 the code for encrypting files and directories in Tahoe-LAFS itself. (See 123 `Twisted ticket #4633`_ for a possible fix to this issue.) 124 125 .. _Twisted ticket #4633: https://twistedmatrix.com/trac/ticket/4633 126 127 If you can connect to the SFTP server (which is provided by the Tahoe-LAFS 128 gateway) only from a client on the same host, then you would be safe from any 129 problem with the SFTP connection security. The examples given below enforce 130 this policy by including ":interface=127.0.0.1" in the "port" option, which 131 causes the server to only accept connections from localhost. 128 132 129 133 You will use directives in the tahoe.cfg file to tell the SFTP code where to
Note: See TracChangeset
for help on using the changeset viewer.