Access Keys:
Skip to content (Access Key - 0)
Kandmtech LLC


443-919-5458

sales@kandmtech.com
 

Red Bird SFX Help version 2.5.0.5



 Red Bird SFX Help 2.5.0.5


Thank you for choosing Red Bird SFX. To help you get acquainted with Red Bird SFX's features, this manual is divided into two sections:

 

Help Topics

 

 

Help topics present important concepts in Red Bird SFX. They are not necessarily tied to a single configuration step. Help topics are recommended reading for all Red Bird SFX users.

The help topics section does not cover all aspects of Red Bird SFX. Please turn to the reference section for an exhaustive explanation of all features that can be found in Red Bird SFX.

 

 

 

 

Reference

 

 

The reference section covers all configuration step, all dialogs and all features of Red Bird SFX. It is highly hierarchical and not optimized for systematic reading.

The reference section is the basis for Red Bird SFX's context sensitive help system. Each configuration step and each dialog have one or more corresponding items in the reference section.

We appreciate your feedback. If you feel that there's a lack of documentation in a certain area of if you find inaccuracies in the documentation, please don't hesitate to contact us at support@kandmtech.com.

http://kandmtech.com/

 


Help Topics

 Help Topics


Contents:


Concepts

 Concepts


Contents:


Connection Overview

Red Bird SFX Connection Overview


Connecting with the Quick Connect Dialog

The Quick Connect dialog is the fastest way to create a new session and connect to the remote machine associated with it.  The dialog can also be opened by clicking on the Quick Connect toolbar button  on either the Red Bird SFX session window or the Connect dialog, or by opening the File menu and selecting the Quick Connect menu option. In the Quick Connect dialog, specify the protocol you will be using, the hostname or IP address, and any other information necessary to make the connection. When you are finished entering the necessary settings for the connection, click on the OK button and you will be connected to the specified host. The session will be created and stored for future use under the name you specified. See below tables, for help with input fields.

 

 

Connecting with the Connect Dialog

The Connect dialog can be accessed with the Connect button  on the toolbar or by selecting the Connect menu item from the File menu. In order to connect to a remote machine using the Connect dialog, you must select a previously created session. You can quickly create a new session by clicking on the New Session  button. The Connection Session properties dialog, specify the protocol you will be using, the hostname or IP address, and any other information necessary to make the connection. When you are finished entering the necessary settings for the connection, click on the OK button and the session data will be saved in the connection dialog. Select the new created session and click ok button or connect button or double click the selected session to connect. See below tables, for help with input fields.

 

Deleting stored session connection

The Connect dialog can be accessed with the Connect button  on the toolbar or by selecting the Connect menu item from the File menu. Once the connection dialog is open select the connection session you wish to delete, click the delete connection button  or hit the delete key. A confirm connection delete dialog will appear, make sure the name of the connection session you wish to delete is correct. If correct click the ok button and the stored connection session will be deleted.

 

Editing or viewing stored session connection

The Connect dialog can be accessed with the Connect button  on the toolbar or by selecting the Connect menu item from the File menu. Once the connection dialog is open select the connection session you wish to edit or view, click connection session properties button , the connection session properties dialog will load. From here you can change or view any information relate to the connection session. If you edited the connection session, you need to click the ok button to store connection session changes. See below tables, for help with input fields.

 

 

Common Connection Data

Input name

Description

Name

The name of the secure session you are creating. This name will be used to store the session connection properties and the name that will be listed in the Connections dialog to be used later to connect to the remote machine.

Protocol

The type of protocol you are using to establish you secure session connection to the remote machine. The protocol setting options are SCP (SSH 1), and SFTP (SSH 2). The protocol specific session option displayed (at the bottom of the dialog) will change depending on the Protocol selected.

The major differences between SCP (SSH 1), and SFTP (SSH 2) are as follows, with more details later:

SCP (SSH 1) protocol is faster than SFTP (SSH 2) on average, however the protocol supports only limited encryption algorithms and does not provide data integrity (e.g. MAC) for data transmitted. SCP only supports RSA public keys for authentication. This protocol is viewed as less secure than SFTP (SSH 2).

SFTP (SSH 2) protocol is slower than SCP (SSH 1) on average, however the protocol supports a wide range of encryption algorithms (include AES) and provides data integrity for data transmitted via MAC. SFTP supports RSA and DSA public keys for authentication. This protocol is viewed as more secure than SCP (SSH 1).

Hostname

The Hostname is the domain name or IP address of the remote machine you are establishing a connection with.

Port

The port number of the SCP (SSH 1), or SFTP (SSH 2) service on the remote machine. For SCP (SSH 1), or SFTP (SSH 2), the default port is 22.

Username

The name the user used to log on to the remote machine.

Password

The password transmitted to the remote machine when using Password authentication. If using the Public Key authentication, this will be the passphrase to decrypt the private key stored locally on your machine. Note with Public Key authentication, the passphrase is not required, however the private key will not be encrypted locally without it.

Auth Type

The authentication type to use during establishment of a connection with the remote machine. Red Bird SFX supports two authentication methods for connecting to the remote machine; Password, and Public Key.

Password authentication transmits the user's password to the remote machine to authenticate the connection. The transmitted password is protected from network eavesdropping, using only the cipher encryption of the data channel.

 

Public Key authentication uses a public/private key pair to authenticate the connection. During the authentication process, the Red Bird SFX client and the remote machine negotiate a public key to use for the connection. Once a public key has been determined, the Red Bird SFX client uses the corresponding private key to perform a signature operation over a unique connection identifier. This signature is then sent to the remote machine for verification. If verification is successful, the Red Bird SFX client is given permission to connect to the remove machine. The security of the mechanism requires that no one but the owner have access to the private key. The private key is stored locally in an identity file. Also, prior to using public-key authentication, the public key must be made available to the SCP (SSH 1), or SFTP (SSH 2) remote machine process.

For more information on generating private-public key pairs, see Key Generation Wizard.

Identity File

The private key identity file, the absolute path to the private key identity files to be used in establishing this connection. See Connecting with public key authentication.

 

 

SCP (SSH 1) Protocol

Input name

Description

Cipher

The encryption algorithm used to create the secure connection to provide data privacy.

The default cipher is Blowfish-cbc. The available ciphers are: Blowfish-cbc, 3DES-cbc, DES-cbc, IDEA-cbc, and arcfour for use with SCP (SSH 1) protocol.

Cipher Speed Information:  The DES-cbc and 3DES-cbc ciphers are very CPU intensive (slow). The arcfour and Blowfish-cbc ciphers are considerably less CPU intensive (faster).

Cipher name convention is cipher name, plus a dash and the Block Cipher mode.

See Block Cipher modes of operation, for a description of CBC, CTR, OFB, CFB, and ECB.

Compression

The compression select box allows you to turn on compression and set the compression level for this SCP (SSH 1) session. The compression levels ranges from 1 (minimal compression) to 9 (maximum compression). A higher level means better compression but slower performance. The compression algorithm used is zlib.

 

SFTP (SSH 2) Protocol

Input name

Description

Cipher

The encryption algorithm used to create the secure connection to provide data privacy. The default ciphers are AES256-cbc, Rijndael256-cbc, AES256-CTR. Multiple encryption algorithms can be selected and ordered in the list, to allow for the protocol to negotiate which ones will be used. The first item in the list of selected encryption algorithms the most desired and descends to the least desired (the last item in the list).

The available ciphers are aes256-cbc, aes192-cbc, aes128-cbc, rijndael256-cbc, rijndael192-cbc, rijndael128-cbc, aes256-ctr, aes192-ctr, aes128-ctr, twofish256-cbc, twofish192-cbc, twofish128-cbc, twofish-cbc, twofish256-ctr, twofish192-ctr, twofish128-ctr, twofish-ecb, twofish-cfb, twofish-ofb, serpent256-cbc, serpent192-cbc, serpent128-cbc, serpent256-ctr, serpent192-ctr, serpent128-ctr, blowfish-cbc, blowfish-ecb, blowfish-cfb, blowfish-ofb, blowfish-ctr, 3des-cbc, 3des-ecb, 3des-cfb, 3des-ofb, 3des-ctr, idea-cbc, idea-ecb, idea-cfb, idea-ofb, cast128-cbc, cast128-ecb, cast128-cfb, cast128-ofb, arcfour256, arcfour128, arcfour, seed128-cbc@ssh.com for use with SFTP (SSH 2) protocol. Note that rijndael and aes are listed as separate ciphers because some SFTP (SSH 2) processes only recognize aes by the name rijndael.

Cipher name convention is cipher name, plus the key sizes, plus a dash and the Block Cipher mode.

See Block Cipher modes of operation, for a description of CBC, CTR, OFB, CFB, and ECB.

MAC

A cryptographic Message Authentication Code (MAC) is a short piece of information used to authenticate a message.

A MAC algorithm, sometimes called a keyed (cryptographic) hash function, accepts as input a secret key and an arbitrary-length message to be authenticated, and outputs a MAC (sometimes known as a tag). The MAC value protects both a message's data integrity as well as its authenticity, by allowing verifiers (who also possess the secret key) to detect any changes to the message content.

The MAC is a component of the with SFTP (SSH 2) protocol consisting of a hashing algorithm used to ensure data integrity between an SFTP (SSH 2) client and an SFTP (SSH 2) machine communicating over a TCP/IP network such as the Internet.

The available MACs are hmac-md5, hmac-sha1, hmac-ripemd160, hmac-ripemd160@openssh.com, hmac-sha1-96, hmac-ripemd160-96, and hmac-md5-96 for use with SFTP (SSH 2) protocol.

Compression

The compression select box allows you to turn on compression and set the compression level for this SFTP (SSH 2) session. The compression levels ranges from 1 (minimal compression) to 9 (maximum compression). A higher level means more compression but slower performance (more CPU intensive). The compression algorithm used is zlib.

 


 

Red Bird SFX Connecting with public key authentication


Using a public-private key pair to log onto an SCP (SSH 1), or SFTP (SSH 2) machine. Setting up public-key authentication for an SCP (SSH 1), or SFTP (SSH 2) Red Bird SFX session is a multi-step process. Identity files must be created using the Key Generation wizard. One of the identity files created by the Key Generation wizard will contain a private key that will be assigned on a session-specific level. The session-specific characteristic of the private key is specified in the connection dialog property Identity File (which is enabled by selecting Public Key authentication in the connection dialog). The other identity file created by the Key Generation wizard will contain the corresponding public key and will need to be transferred to the proper location on the SCP (SSH 1), or SFTP (SSH 2) machine. See Configuring the OpenSSH remote machine process to recognize your public-key file.

 

 


 

Red Bird SFX Choosing authentication type


Red Bird SFX supports two authentication methods for connecting to the remote machine; Password, and Public Key. The authentication type to use during establishment of a connection with the remote machine.

 

Password authentication transmits the user's password to the remote machine to authenticate the connection. The transmitted password is protected from network eavesdropping, due to the cipher encryption of the data channel. In conventional password authentication, you prove you are who you claim to be by proving that you know the correct password. The only way to prove you know the password is to tell the remote machine what you think the password is. This means that if the remote machine has been hacked, or spoofed, an attacker can learn your password.

 

Public key authentication is an alternative means of identifying yourself to a login remote machine, instead of typing a password. It is more secure and more flexible, but more difficult to set up.

In conventional password authentication, you prove you are who you claim to be by proving that you know the correct password. The only way to prove you know the password is to tell the remote machine what you think the password is. This means that if the remote machine has been hacked, or spoofed, an attacker can learn your password.

Public key authentication solves this problem. You generate a key pair, consisting of a public key (which everybody is allowed to know) and a private key (which you keep secret and do not give to anybody). The private key is able to generate signatures. A signature created using your private key cannot be forged by anybody who does not have that key; but anybody who has your public key can verify that a particular signature is genuine.

So you generate a key pair on your own computer, and you copy the public key to the remote machine under a certain name. Then, when the remote machine asks you to prove who you are, Red Bird SFX can generate a signature using your private key. The remote machine can verify that signature (since it has your public key) and allow you to log in. Now if the remote machine is hacked or spoofed, the attacker does not gain your private key or password; they only gain one signature. And signatures cannot be re-used, so they have gained nothing.

There is a problem with this: if your private key is stored unprotected on your own computer, then anybody who gains access to that will be able to generate signatures as if they were you. So they will be able to log in to your remote machine under your account. For this reason, your private key is usually encrypted when it is stored on your local machine, using a passphrase of your choice. In order to generate a signature, Red Bird SFX must decrypt the key, so you have to type your passphrase.

There is more than one public-key algorithm available. The most common is RSA, but others exist, notably DSA (otherwise known as DSS), the USA's federal Digital Signature Standard.


 

 Key Generation Wizard


Creating a public-private key pair to use for public key authentication in SCP (SSH 1), or SFTP (SSH 2) session connection:

  1. Select the tools menu, and then select the menu item Create Key Pair. The Key Generation Wizard dialog will open.
  2. On the Key Generation Wizard dialog's initial screen, select protocol (e.g.  SCP (SSH 1) or SFTP (SSH 2) ) that the keys will be used with. Note If the public-private key pair will be used with SFTP (SSH 2), you will need to also select the encryption algorithm for the key pair.
  3. Click the next button and the next screen in the Key Generation Wizard dialog will open. On the Key Generation Wizard dialog's second screen, you will be prompted to enter a passphrase (will be called the password in the connection dialog), and enter a comment of your choice.
    • The passphrase is used to encrypt the local stored key on your machine so that if someone gets a copy of your key from your machine they can not use it to authenticate with the remote machine without the passphrase. The passphrase is a suggest but optional field and does not have to be entered. Note however if it is not entered, the key will be stored locally on your machine without a passphrase. If the passphrase is entered you will have to remember the passphrase at connection time to use the key.
    • The comment is used as a hint at passphrase entering time to remind you what the passphrase was.
  4. Click the next button and the next screen in the Key Generation Wizard dialog will open. On the Key Generation Wizard dialog's third screen, you will be prompted to enter a key length in bits 512 to 2048. A lower number provides less security, takes less time to generate and authenticates faster. A higher number provides greater security, takes more time to generate, and greater security, takes more time to generate, and authenticates more slowly. A 1024 bit key length is the minimum recommended value.
  5. Click the next button and the next screen in the Key Generation Wizard dialog will open. On the Key Generation Wizard dialog's fourth screen, you will be prompted to move the mouse until the progress bar below registers 100% (this may take several minutes of moving the mouse). This provides important random input that is used during key generation to seed the random number generator.
  6. Once the progress reaches 100% you will see the message "Generating key....Please wait!!!"

    the message will disappear and the back, next, and cancel buttons will become enabled again. Click the next button and the next screen in the Key Generation Wizard dialog will open. On the Key Generation Wizard dialog's fifth screen,

    you will be prompted for the absolute path and file name of the private key file.

    The public key will also use the same directory and filename as the private key, but with a .pub extension on the filename. Either manually enter or click file browser button. Once you are finished entering the path and filename, click the finish button and the public-private keys will be written at the select path. The Key Generation Wizard dialog will close. You have successful created the public-private key pair.

 

Note once the public-private keys are generated you may want to see Configuring the OpenSSH remote machine process to recognize your public-key file.


 

 Configuring the OpenSSH remote machine process to recognize your public-key file


Configuring the OpenSSH remote machine process to recognize your public-key file - In order to use your public key you must transfer the public-key file  (typically identity.pub) created by the Key Generation wizard to your ~/.ssh directory on the remote machine you wish to authenticate with.

  1. Log on to the remote machine using Red Bird SFX with password authentication.
  2. Once connected to remote machine use remote machine filing system to navigate your home directory (click the home key on remote filing system will take you to your home directory), open the .ssh/ directory.
  3. In the local filing system of Red Bird SFX navigate to the path you stored the keys at. Select the public key (the public key ends in the extension .pub), copy to the remote .ssh/ directory. Note the transfer mode should be set to text.
  4. Once the public key is transferred to the remote machine's .ssh/ directory, select the public key file in the remote filing system, click file properties, and rename the public key to authorized_keys if the key is for SCP (SSH 1) or authorized_keys2 if the key is for SFTP (SSH 2). Change the permissions to read, and write for owner only (e.g. 600 or -rw-------), click ok. The user home needs to have its permissions set to read, write, execute for owner; read, execute for group; read, execute for other only (e.g. 755 or -rwxr-xr-x). The .ssh/ directory needs to have its permissions set to read, write, execute for owner for other only (e.g. 700 or -rwx------).

The method described above uses only a single public key in the authorization file. It is possible to have more than one public key in the authorized_keys or authorized_key2 file.


 

 Global Options


The Global Options dialog is accessed by opening the Tools menu and selecting Global Options. Global options apply to all sessions unless they are specifically overridden on a per session.

  • Graphical User Interface
    • Show connection session dialog on startup - if checked the connection session dialog will load when Red Bird SFX is started.
    • Show Toolbar - if checked the Red Bird SFX toolbar will show by default on startup
    • Show transfer status bar - if checked the Red Bird SFX transfer status bar will show by default on startup
    • Local default folder view - Allows the selection of the default view for local machine file panel on startup
    • Remote default folder view - Allows the selection of the default view for remote machine file panel on startup
  • Transfers
    • Text mode file extensions match - a comma separated list of file extensions that should be treated as text files if the transfer mode is left as automatic. Note this can be overridden at transfer time. Used when you have a common file extension for a file that you want transferred in text mode normally without overriding it at transfer time.
    • Allow password storage locally - if check passwords (or passphrases) for remote machine connections can be stored locally with the remote machine connection data. Otherwise the passwords (or passphrases) will not be saved. This may result in prompting for remote machine passwords (or passphrases) at connection time. You can gain increased security by never saving passwords (or passphrases), however this will require that you always remember them.

 


Navigating and filing system operations

Red Bird SFX Navigating and filing system operations


The navigating and filing system is divided into two halves of the main screen the top half is the operations for the remote machine and the bottom half is the operation for the local machine. The navigating and filing system for both local and remote machine consist of: a file panel, directory tree, "go to path", and toolbar.

Contents:


 

Red Bird SFX File panel


File panel

In the file panel you can enter the subdirectory of current directory by double-clicking the subdirectory icon (or by selecting the subdirectory icon and pressing Enter).

The remote machine file panel (in details view) has the following columns:

  • Name - the name of the file or folder,
  • Size - the size of the file or folder,
  • Type - the type of file,
  • Modified - the last time the file or folder was modified, Permission - the permission set on the file or folder,
  • Owner - the owner set on the file or folder, and
  • Group - the group set on the file or folder.

The local machine file panel (in details view) has the following columns:

  • Name - the name of the file or folder,
  • Size - the size of the file or folder,
  • Type - the type of file, and
  • Modified - the last time the file or folder was modified.

 

Red Bird SFX Directory tree


Directory tree

Using the directory tree you can enter any directory visible on the tree just by clicking on its icon. If you wish to expand the directory tree of a visible directory icon double-clinking the directory icon or single-clicking the plus icon.

 

 


 

Red Bird SFX Go to path


Go to path

Using the "go to path" you will manually enter the absolute path you wish to navigate to, into the "go to" text field, then click the "go to" icon   or hit enter key while focused in the go to text field.

 


 

Red Bird SFX Back/Forward


Back/Forward

To navigate back/forward   in directory history (the same as in Windows Explorer and similar to Back/Forward buttons in a web browser). To use quick keys pressing Atl+Left key* to go back and Atl+Right key* to go forward.

 

 

 

* Note when using the navigation key you must be focused on the correct side that is for local machine navigation keys must be focused on bottom navigation and for remote machine navigation keys must be focused on top navigation. To focus using quick key for local machine press Ctrl+L key, for remote machine Ctrl+R key.


 

Red Bird SFX Parent directory


Parent directory

To go one level up in the directory structure, click the up button  or pressing Backspace key*.

 

 

* Note when using the navigation key you must be focused on the correct side that is for local machine navigation keys must be focused on bottom navigation and for remote machine navigation keys must be focused on top navigation. To focus using quick key for local machine press Ctrl+L key, for remote machine Ctrl+R key.


 

Red Bird SFX Home directory


Home directory

To open the home directory. For the remote panel the home directory is by default your user directory on the server, and for local panel it is your desktop directory. Click the home icon  or pressing Ctrl+H key*, and to navigate back to home directory automatically.

 

 

 

* Note when using the navigation key you must be focused on the correct side that is for local machine navigation keys must be focused on bottom navigation and for remote machine navigation keys must be focused on top navigation. To focus using quick key for local machine press Ctrl+L key, for remote machine Ctrl+R key.


 

Red Bird SFX Refreshing the listing in a folder (e.g. File panel)


Refreshing the listing in a folder (e.g. File panel)

To refresh the folder listing (e.g. File panel) click the Refresh icon   or press the F5 key*.

 

 

 

 

* Note when using the navigation key you must be focused on the correct side that is for local machine navigation keys must be focused on bottom navigation and for remote machine navigation keys must be focused on top navigation. To focus using quick key for local machine press Ctrl+L key, for remote machine Ctrl+R key.


 

Red Bird SFX Viewing and setting properties for a File or Folder


Viewing and setting properties for a File or Folder

To view or set the properties for a file or folder in the file panel select the items you wish to view or set the properties, then click the File Properties icon  or press Ctrl+P keys*. You will see the file properties dialog. If the file properties are for the local machine, you can only view the file properties. If the file properties are for the remote machine, you can; rename the file, change the owner, change the group, and set permissions. To rename the file, in the file name text field enter the new name for the file. To change the owner, in the owner text field enter the new name for the owner. To change the group, in the group text field enter the new name for the group. To change the permission, check the change permissions check box and check any permission you want to set. Once the modifications to the properties are done, click the ok button and the changes will be saved. Note if multiple files are selected for the file properties you can not change the file name.

The local machine file properties consist of:

  • Name - the name of the selected item.
  • Size - the size of the selected item
  • Location - the location of the selected item
  • Type - the type of items selected (e.g. PDF, word doc, etc)
  • Modified - the last modified time of the selected item
  • Permissions - the hidden permission is checked if the file is a hidden file, the can write permission is checked if the file is modifiable, the can read permission is checked if the file is readable.

 

The remote machine file properties consist of:

  • Name - the name of the selected item.
  • Size - the size of the selected item
  • Location - the location of the selected item
  • Type - the type of items selected (e.g. PDF, word doc, etc)
  • Owner - the owner of the selected item.
  • Group - the group of the selected item.
  • Modified - the last modified time of the selected item.
  • Permission - The basic permissions of read, write, and execute, are applied to three different categories of users. The user categories are: the owner (the process' UID matches the user of the file), the group (not the owner, but the process' GID is a member of the file's group), and other (everyone else). In addition to these nine mode bits (read, write, and execute, for each of three categories of owner, group, and others), there are three others: the set User ID (Set UID), the set Group ID (Set GID), and the sticky (or text) bit.

 

 

* Note when using the navigation key you must be focused on the correct side that is for local machine navigation keys must be focused on bottom navigation and for remote machine navigation keys must be focused on top navigation. To focus using quick key for local machine press Ctrl+L key, for remote machine Ctrl+R key.


 

Red Bird SFX Renaming a File or Folder


Renaming a File or Folder

See Viewing and setting properties for a File or Folder


 

Red Bird SFX Finding a File or Folder in File panel


Finding a File or Folder in File panel

Using the "filter folder results"   you will enter the characters you wish to filter the result by, into the "filter folder results" text field, then click the "filter folder results" icon    or hit enter key while focused in the filter folder results text field. The items displayed in file panel will be filtered to only show the items that matched the characters you entered. To clear the filtering of the items in the filter folder results, click the Refresh icon  or press the F5 key*, to clear the "filter folder results" text field, then click the "filter folder results" icon     or hit enter key while focused in the filter folder results text field.

 

 

* Note when using the navigation key you must be focused on the correct side that is for local machine navigation keys must be focused on bottom navigation and for remote machine navigation keys must be focused on top navigation. To focus using quick key for local machine press Ctrl+L key, for remote machine Ctrl+R key.


 

Red Bird SFX Creating a Folder


Creating a Folder

To create a folder in the file panel, click the New Folder icon  or press Ctrl+N key*. You will be prompted to enter the name of the new folder. If you are sure you want to create this folder click the ok button, if you do not want to create this folder click cancel button.

 

* Note when using the navigation key you must be focused on the correct side that is for local machine navigation keys must be focused on bottom navigation and for remote machine navigation keys must be focused on top navigation. To focus using quick key for local machine press Ctrl+L key, for remote machine Ctrl+R key.


 

Red Bird SFX Deleting a File or Folder


Deleting a File or Folder

To delete a file or folder in the file panel select the items you wish to delete, then click the File Delete icon  or press the delete key*. You will be prompted to confirm you really want to delete the selected items. To view the selected items you are delete click the details >> button   on the confirm file delete dialog and a list of items being deleted will be displayed. If you are sure you want to delete those items click the ok button, if you do not want to delete those items click cancel button.

 

* Note when using the navigation key you must be focused on the correct side that is for local machine navigation keys must be focused on bottom navigation and for remote machine navigation keys must be focused on top navigation. To focus using quick key for local machine press Ctrl+L key, for remote machine Ctrl+R key.


 

 Verifying the Host Key


If you are using Red Bird SFX to connect to a remote machine for the first time, you will probably see a message looking something like this:

 

The authenticity of host '127.0.0.1 (127.0.0.1)'

can't be established. 77:98:4c:cc:a4:b5:7e:fb:ca:8f:b4:af:11:1b:33:28.

Are you sure you want to continue connecting, add this host

to your set of known hosts?

Do you want to proceed?

 

 

This is a feature of the SSH protocol. It is designed to protect you against a network attack known as spoofing: secretly redirecting your connection to a different computer, so that you send your password to the wrong machine. Using this technique, an attacker would be able to learn the password that guards your login account, and could then log in as if they were you and use the account for their own purposes.

To prevent this attack, each remote machine has a unique identifying code, called a host key. These keys prevent a remote machine from forging another remote machine's key. If you connect to a remote machine and you receive an unexpected host key, Red Bird SFX can warn you that the remote machine may have been switched and that a spoofing attack might be underway.

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@

@       WARNING: POSSIBLE DNS SPOOFING DETECTED!        @

@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@

The RSA host key for '127.0.0.1' has changed,

and the key for the according IP address '127.0.0.1'

is unchanged. This could either mean that

DNS SPOOFING is happening or the IP address for the host

and its host key have changed at the same time.

ONLY PROCEED IF YOU KNOW WHAT YOU ARE DOING!

Do you want to proceed?

 

Red Bird SFX records the host key for each remote machine you connect to, in the Known Host Keys data. Every time you connect to a remote machine, it compares the remote machine's host key to the host key you received the last time you connected. If the keys differ, you will receive a warning and a chance to abandon your connection before you enter any private information such as a password.

However, when you connect to a remote machine for the first time, Red Bird SFX has no way of telling whether the host key is the right one or not. So it gives the warning shown above, and asks you whether you want to trust this host key or not.

Whether or not to trust the host key is your choice. If you are connecting within a company network, you might feel that all the network users are on the same side and spoofing attacks are unlikely, so you might choose to trust the key without checking it. If you are connecting across a hostile network (such as the Internet), you should check with your system administrator, perhaps by telephone or in person. (Some modern remote machines have more than one host key. If the system administrator sends you more than one fingerprint, you should make sure the one Red Bird SFX shows you, is on the list, but it doesn't matter which one it is.)

Once the key is verified, you can see it during all future sessions on Known Host Keys dialog.

 

 


 

 Transferring files and folders


Transferring files to or from remote machines can be accomplished by the following operations:

  1. Select the items in the file panel you wish to copy or move then in the toolbar on top of the file panel select the copy   or move  icon or press Ctrl+C (for copy)* or Ctrl+M (for move)*. You will be them prompted by a confirm copy or move dialog.

  2. You will be prompted to confirm you really want to copy or move the selected items. To view the selected items you are copy or move click the details >> button   on the confirm file copy or move dialog, the following options and details about the transfer will be available:
    • Transfer mode - automatic, text, and binary. With some special text files (scripts, etc) it is important to convert the line feeds from double return character to a single return character, which is what text transfer mode performs for you on transfer. The binary transfer, transfers the file intact without modifying any characters in the file.
      • The automatic transfer mode, selects the files that should be transfer in text mode automatically by the file extension matches. All files that don't match will be transferred in binary mode. Note you can add more file extensions in "Transfer following files in text mode" text field (semicolon separated, the asterisk is used as a wild card match character).
      • The text transfer mode, forces all files being transferred to be transferred in text mode.
      • The binary transfer mode, forces all files being transferred to be transferred in binary mode.
    • Attributes - are file attributes that can be set on the file machine the file is being transferred to.
      • Transfer to remote machine
        • Preserve timestamp - sets the local machine timestamp on the file on the remote machine after transfer
        • Replace illegal characters - replace characters in the file name (when transferring between different operating systems)
        • Set permissions - sets the remote machine permissions for the file.
      • Transfer to local machine
        • Preserve timestamp - sets the local machine timestamp on the file on the remote machine after transfer
        • Replace illegal characters - replace characters in the file name (when transferring between different operating systems)
    • Files transferring - a list of items being copied or moved will be displayed.
  3. If you are sure you want to transfer those items click the ok button, if you do not want to transfer those items click cancel button. Note when you select move as transfer option the file and folders will be delete from the original machine after transfer has completed.
  4. When you click ok the items being transferred will be queued in the transfer status bar. The transfer status bar consists of an upload progress and download progress section. The upload progress section shows files being transferred to the remote machine from the local machine. The download progress section shows files being transferred from the remote machine to the local machine. The files transferred in a group (select to be transferred in same action) will be grouped under a transfer folder. Files being transferred will show you the transfer mode in the file icon (binary transfer mode  and text transfer mode ) of the transfer status bar. The size of the file total and amount that has been transferred so far will be shown on the progress bar of the transfer item. The transfer rate will also be shown in the progress bar of the transfer item.  

Single upload to remote machine


 

Single download from remote machine


 

Grouped under a transfer folder


 

 

* Note when using the navigation key you must be focused on the correct side that is for local machine navigation keys must be focused on bottom navigation and for remote machine navigation keys must be focused on top navigation. To focus using quick key for local machine press Ctrl+L key, for remote machine Ctrl+R key.

 


Reference

 Reference


Contents:


Menus

  Menus


The Red Bird SFX has a number of menus that provide access to program dialogs, controls, and features. The menus are listed below:

 

 

 

 


 

  File Menu


This topic lists the options available on the File menu including connection, disconnect, and exit.

 

 

Connect

Opens the Connections dialog where you can connect to or edit existing sessions, or create new sessions, or delete existing sessions.

 

Quick Connect

Opens the Connection Session Properties dialog. This is the quickest way to define a session connection and connect to the remote machine. This is often used to make one-time connections. All connections defined are saved in the connection session data file for later use.

 

Reconnect

Reopens the last secure connection made with a remote machine during the current Red Bird SFX session. If Red Bird SFX was just opened this option will not be available because no prior connection during the session was made. If Red Bird SFX has an active session connection then this option will not be available until you disconnect.

 

Disconnect

Closes the secure connection you made with the remote machine, cancels any active downloads or uploads.

 

Exit

Closes all Red Bird SFX windows, cancels any active downloads or uploads, and exits Red Bird SFX completely.


 

  Tools Menu


This topic lists the options available on the Tools menu including

 

 

Global Options

Opens the Global Options dialog, where you can change options that control the graphical user interface, and transfers.

 

Create Key Pair

Opens the Key Generation Wizard, where you can create a new public/private key file to be used for secure session.

 

Known Host keys

Opens the SSH Known Hosts, where you can view, or delete any secure session host.


 

  View Menu


This topic lists the options available on the View menu including

 

 

Toolbar

Toggles the visibility of the toolbar, which usually contains standard quick shortcut buttons (Connect, Quick Connect, Reconnect, Disconnect etc.).

 

Transfer Status Bar

Toggles the visibility of the transfer status bar, located at the bottom of the window. The transfer status bar displays useful information about the active downloads or uploads.


 

  Help Menu


This topic lists the options available on the Help menu including

 

 

Help Topics

Opens the Red Bird SFX Help window, which contains useful information that can help you with secure file transfers, and file management.

 

Our Web Page

Opens your default web browser to the Red Bird SFX product web page.

 

Ordering

Opens your default web browser to the Red Bird SFX order web page.

 

Download Latest

Opens your default web browser to the Red Bird SFX product download web page.

 

License

Opens the license wizard dialog, where you can view the license information for the installed version of Red Bird SFX.

 

About

Opens the about dialog which contains information about Red Bird SFX.


Toolbar

  Toolbar


This topic lists the options available on the toolbar including

 

 

 

Note when button in toolbar is grey the button is disabled. The button become disabled based on the active connection states (e.g. you can not disconnect if you do not have a connection opened). The toolbar is generally located below the drop down menu bar, however it may not be visible if you toggled the visibility of the toolbar. To make the toolbar visible again click the view menu and then select Toolbar.


 

 Connect


Opens the Connections dialog where you can connect to or edit existing sessions, or create new sessions, or delete existing sessions.


 

 Quick Connect


Opens the Connection Session Properties dialog. This is the quickest way to define a session connection and connect to the remote machine. This is often used to make one-time connections. All connections defined are saved in the connection session data file for later use.

 


 

 Reconnect


Reopens the last secure connection made with a remote machine during the current Red Bird SFX session. If Red Bird SFX was just opened this option will not be available because no prior connection during the session was made. If Red Bird SFX has an active session connection then this option will not be available until you disconnect.

 


 

 Disconnect


Closes the secure connection you made with the remote machine, cancels any active downloads or uploads.

 

 


 

 Status bar


The Red Bird SFX status bar is located at the bottom of the application. The status bar (shown below) is made up of the following fields (as they appear from left to right):

Status

The messages include the following:

  • "not connected" - no active session connection
  •  "connected" - an active session connection

Name

The name of the active session connection (username @ connection session name)

 

Secured connection lock

When lock is visible Red Bird SFX has established a secure session connection; hover over the lock to see quick information about the established connection or click on the lock. When the lock is clicked the connection status dialog will open to display connection information.

 


 

 File management toolbar


This topic lists the options available on the file management toolbar.

 

File management toolbar buttons

Button

Name

Description

Go to path

Enter a path in manually and click go to button on the right of the input box. The path will be navigate to with out having to click through folders.

Back

The back button will take you back to the last path in you navigating history.

Forward

The forward button will take you forward to the last path in you navigating history.

Up

The up directory button will move you to the parent directory in you path.

Refresh

The refresh button will reload the current directory listing.

Go to User Home

The go to user home button will navigate you back to the user home directory.

File Copy

The file copy button will launch the file copy dialog to transfer the file.

File Move

The file move button will launch the file move dialog to transfer the file and delete the original file.

File Delete

The file delete button will launch the delete confirmation dialog for delete the selected file.

New Folder

The new folder button will launch the new folder dialog to create a new folder.

File Properties

The file properties button will launch the file properties dialog to allow the properties to be viewed or changed.

     

Folder views

The folder views will change the folder listing views. Available views are: Large Icons, Small Icons, and Details. The default view is the details view.

Filter Folder Results

Enter text in the filter folder results text field and click the filter button, all files and folders that do not match your filter criteria will be disappear. Helpful to quick find a file in a large folder.

 


 

 Quick Keys


The following keyboard accelerators can be used during interactions with Red Bird SFX.

 

*Note when using the navigation key you must be focused on the correct side that is for local machine navigation keys must be focused on bottom navigation and for remote machine navigation keys must be focused on top navigation. To focus using quick key for local machine press Ctrl+L key, for remote machine Ctrl+R key.

Quick Keys

Keys

Window, focus

Description

Alt+C

Main window

Launches the connections dialog

Alt+Q

Main window

Launches the Quick connect dialog

Alt+D

Main window

Disconnects from remote machine

Alt+R

Main window

Reconnects to previous remote machine

Ctrl+L

Main window

Set the screen focus to local machine

Ctrl+R

Main window

Set the screen focus to remote machine

F1

Main window

Opens the Red Bird SFX Help window

Backspace

Main window focus on local or remote machine affects which machine performs the action*

move you to the parent directory in you path

Delete

Main window focus on local or remote machine affects which machine performs the action*

Deletes the select items

F5

Main window focus on local or remote machine affects which machine performs the action*

reload the current directory listing.

Alt+Right Arrow Key

Main window focus on local or remote machine affects which machine performs the action*

Move forward in path history

Alt+Left Arrow Key

Main window focus on local or remote machine affects which machine performs the action*

Move backward in path history

Ctrl+H

Main window focus on local or remote machine affects which machine performs the action*

Will navigate you back to the user home directory.

Ctrl+N

Main window focus on local or remote machine affects which machine performs the action*

Will launch the new folder dialog to create a new folder.

Ctrl+F

Main window focus on local or remote machine affects which machine performs the action*

Will set the focus to the "Filter Folder Results" text box

Enter

 

invoke the action of the focus owner

Ctrl+C

Main window focus on local or remote machine affects which machine performs the action*

Will launch the file copy dialog to transfer the file.

Ctrl+M

Main window focus on local or remote machine affects which machine performs the action*

Will launch the file move dialog to transfer the file and delete the original file.

Ctrl+P

Main window focus on local or remote machine affects which machine performs the action*

Will launch the file properties dialog

Escape

 

invoke cancel or close on dialogs

Alt+C

Connection dialog

Connects to selected connection property of a remote machine

Alt+N

Connection dialog

Launches the Quick connect dialog

Alt+P

Connection dialog

Launches the connect dialog properties

Delete

Connection dialog

Deletes the selected connection property of a remote machine

 


 

 Block Cipher modes of operation


The Block Cipher modes of operation are processes to transforms data into an unreadable form to provide confidentiality of the data. In cryptography, a block cipher operates on blocks of fixed length, often 64 or 128 bits. Because messages may be of any length, and because encrypting the same plaintext under the same key always produces the same output (that is identical plaintext blocks are encrypted into identical ciphertext blocks), several modes of operation have been invented which allow block ciphers to provide confidentiality for messages of arbitrary length. The block cipher modes provided are CBC, CTR, OFB, CFB, and ECB.

 

Block Cipher modes of operation

Mode name

Description

CBC

In the cipher-block chaining (CBC) mode, each block of plaintext is XORed with the previous ciphertext block before being encrypted. This way, each ciphertext block is dependent on all plaintext blocks processed up to that point. Also, to make each message unique, an initialization vector must be used in the first block.

CFB

The cipher feedback (CFB) mode, a close relative of CBC, makes a block cipher into a self-synchronizing stream cipher. Operation is very similar; in particular, CFB decryption is almost identical to CBC encryption performed in reverse.

OFB

The output feedback (OFB) mode makes a block cipher into a synchronous stream cipher: it generates keystream blocks, which are then XORed with the plaintext blocks to get the ciphertext. Just as with other stream ciphers, flipping a bit in the ciphertext produces a flipped bit in the plaintext at the same location. This property allows many error correcting codes to function normally even when applied before encryption.

CTR

In the counter (CTR) mode, like OFB, counter mode turns a block cipher into a stream cipher. It generates the next keystream block by encrypting successive values of a "counter". Unlike OFB mode, CTR mode allows a random access property during decryption.

ECB

The electronic codebook (ECB) mode is the simplest of the encryption modes. The message is divided into blocks and each block is encrypted separately. The disadvantage of this method is that identical plaintext blocks are encrypted into identical ciphertext blocks; thus, it does not hide data patterns well. In some senses, it doesn't provide serious message confidentiality, and it is not recommended for use in cryptographic protocols at all.

 


 

 Error message dialog


Error message dialogs

From time to time you may perform an action that causes in error. The error message dialog consist of two parts the wrapped up error message that displayed on the initial dialog and then the details which can be viewed by clicking the details button.

 


 



 

 Known issues


 

Numeric Keypad Mapping

Numeric keypad mapping does not work properly in Java-based GUI.

Affected OS: Solaris, linux - Red Bird SFX Client

Description:  (from SUN) Neither my backspace key nor my delete key have any effect in any field when using Red Bird SFX. When I have the numlock turned on, many keys cease functioning, including but not necessarily limited to: backspace, delete, return, tab, and the zero on the number pad. See Sun Bug ID: 6173972.

Workaround:

The workaround is to set the environment variable _AWT_USE_TYPE4_PATCH to false, as follows:

# setenv _AWT_USE_TYPE4_PATCH false

 

Permission denied

When using Red Bird SFX with protocol SCP (SSH 1) and navigating to a directory, check folder properties, deleting folder, coping/moving remote folder; will receive a permission denied or failure message.

Affected OS: All

Description:  Can not seem to perform operations (e.g. navigating to a directory, checking folder properties, deleting folder, coping/moving remote folder, etc) on a folder. The SCP (SSH 1) protocol relies on command line programs (e.g. ls, du, rm ...) to perform operations that are directed by the Red Bird SFX client. These operations require the right owner, group, and permission to work on the command line as design by the remote machine.

Workaround:

The workaround is to set the correct owner, group, and read & execute permissions on the directory. The owner and group should be the owner and group who has the rights to modify the folder. The permission needs to have read and execute set for owner and group at minimum (e.g. 550 or dr-xr-x---).

 


 

 System Requirements


The following are the minimum system requirements needed to successfully run Red Bird SFX:

  • 128 MB RAM minimum
  • 50 MB hard disk space minimum
  • Intel® Pentium or higher (or compatible)
  • Monitor
  • Mouse or other pointing device
  • CD-ROM drive attached to your computer
  • Java 2 SDK, Standard Edition (J2SE SDK) 1.4 or higher
  • Operating System:
    • Windows: Windows Vista, Windows 2000/XP, Windows Server 2008, Windows Server 2003, Windows NT 4.0, Windows 98/ME, Windows Vista x64, Windows XP x64, Windows Server 2008 x64, Windows Server 2003 x64
    • Macintosh OS X Tiger (10.4 or higher)
    • Linux / Unix / Solaris with GUI

Note installers for Red Bird SFX have been built for the following operating systems: windows, linux, solaris, and Mac OS X.

 


 

 Installation


OS-Specific Red Bird SFX 2.2.0.5 Installation Notes:

To install Red Bird SFX on Windows:

  1. Close all other running applications before installing Red Bird SFX.
  2. Insert CD; or download the installer redbirdsfx_windows_2_5_0_5.exe. Open the CD or navigate to [windows] folder or folder containing redbirdsfx_windows_2_5_0_5.exe if downloaded.
  3. To begin installation, double-click redbirdsfx_windows_2_5_0_5.exe.
  4. The Introduction screen appears.
  5. Read the information provided. Click Next.
  6. Accept the license agreement when prompted. Click Next.
  7. Accept the default or enter the directory where you want Red Bird SFX installed. Click Next.
  8. On the Choose Shortcut Folder screen you are asked for the locations of shortcut installs.
  9. Click Next to accept the default location or specify another option from the list.
  10. Review the installation options that you have selected. If the options are correct, click Next to begin the installation.
  11. Wait for the progress bar to indicate that the install is complete. Click Finish.

 

To install Red Bird SFX on Mac:

  1. Close all other running applications before installing Red Bird SFX.
  2. Insert CD; or download the installer redbirdsfx_macos_2_5_0_5.dmg. Open the CD or navigate to [mac] folder or folder containing redbirdsfx_macos_2_5_0_5.dmg if downloaded.
  3. To begin installation, click redbirdsfx_macos_2_5_0_5.dmg.
  4. The Introduction screen appears.
  5. Read the information provided. Click Next.
  6. Accept the license agreement when prompted. Click Next.
  7. Accept the default or enter the directory where you want Red Bird SFX installed. Click Next.
  8. Review the installation options that you have selected. If the options are correct, click Next to begin the installation.
  9. Wait for the progress bar to indicate that the install is complete. Click Finish.

 

To install Red Bird SFX on Unix ( Linux / Unix / Solaris ):

  1. Close all other running applications before installing Red Bird SFX.
  2. Insert CD; or download the installer redbirdsfx_unix_2_5_0_5.sh. Open the CD or navigate to [unix] folder or folder containing redbirdsfx_unix_2_5_0_5.sh if downloaded.
  3. To start the installation launcher:
    • Copy redbirdsfx_unix_2_5_0_5.sh to desktop.
    • Open command line to desktop, and make sure execute permissions (chmod 755 redbirdsfx_unix_2_5_0_5.sh) are set on installer.
    • Enter ./install_linux.sh on the command line.
  4. The Introduction screen appears.
  5. Read the information provided. Click Next.
  6. Accept the license agreement when prompted. Click Next.
  7. Accept the default or enter the directory where you want Red Bird SFX installed. Click Next.
  8. Review the installation options that you have selected. If the options are correct, click Next to begin the installation.
  9. Wait for the progress bar to indicate that the install is complete. Click Finish.

 

Troubleshooting Your Red Bird SFX Installation

PROBLEM:

The main installation program does not launch, or gives you one of the following errors:

On Windows: The install4j wizard could not find a Java™ Runtime Environment on your system. Please locate a suitable 32-bit JRE. (minimum version: 1.4) OR No JVM could be found on your system. Please define EXE4J_JAVA_HOME to point to an installed 32-bit JDK or JRE or download a JRE from www.java.com

On Mac: An internal error occurred (error code: {0}) The environment variable {0} has to be defined Wrong Parameter Usage File or directory {0} not found or empty The JVM could not be started. The main method may have thrown an exception. The JVM found at {0} is damaged. Please reinstall or define EXE4J_JAVA_HOME to point to an installed JDK or JRE. The {0} envionment variable does not point to a working JDK or JRE. The JVM found in your path is damaged. Please reinstall or define EXE4J_JAVA_HOME to point to an installed JDK or JRE. No JVM could be found on your system. Please define EXE4J_JAVA_HOME to point to an installed JDK or JRE or download a JRE from www.java.com.

On Unix (Linux / Unix / Solaris): No suitable Java Virtual Machine could be found on your system. The version of the JVM must be at least 1.4. Please define INSTALL4J_JAVA_HOME to point to a suitable JVM. You can also try to delete the JVM cache file /home/user/.install4j

Description:  The Java Virtual Machine (JVM) is not installed or can not be found by installer or the JVM is not 1.4 (or higher).

Solution:

This error is because the Red Bird SFX requires a JVM version of at minimum 1.4 (or higher). The Installer or Red Bird SFX can not find the JVM or it is not installed. If the required JVM is NOT installed, please install it and run again. If the required JVM is installed, define the environment variable to point to the JVM installed location.

Java 2 SE 5.0 Release 1 for Mac OS X can be found at: http://www.apple.com/support/downloads/java2se50release1.html

Java 2 SE 5.0 for all other OScan be found at: http://www.java.sun.com