Hello
File is never uploaded using SFTP, here is the log:
Nov 5, 2012 5:16:08 PM com.prosc.ftpeek.GenericFTPModel setKnownHost
INFO: Setting known SFTP host with host key
DEBUG [SshPublicKeyFile] 5 Nov 2012 17:16:08.796 : Parsing public key file
DEBUG [SshPublicKeyFile] 5 Nov 2012 17:16:08.804 : Public key is not in the default format, attempting parse with other supported formats
DEBUG [SshPublicKeyFile] 5 Nov 2012 17:16:08.804 : Attempting SECSH-PublicKey-Base64Encoded
DEBUG [SshPublicKeyFile] 5 Nov 2012 17:16:08.805 : Attempting OpenSSH-PublicKey
DEBUG [AbstractKnownHostsKeyVerification] 5 Nov 2012 17:16:08.826 : Allowing pcpftp.pearsoned.com with fingerprint 1024: b0 2 f0 31 aa c4 a8 2c f0 2c 24 93 af 57 17 46
WARN [AbstractKnownHostsKeyVerification] 5 Nov 2012 17:16:08.827 : Cannot write to known_hosts file as none supplied
INFO [SCPClient] 5 Nov 2012 17:16:08.844 : SCPClient settings validated.
DEBUG [SCPClient] 5 Nov 2012 17:16:08.845 : Connecting to pcpftp.pearsoned.com:22
DEBUG [StreamSocketFactory] 5 Nov 2012 17:16:08.855 : Connecting to pcpftp.pearsoned.com:22 via standard socket
INFO [TransportProtocolCommon] 5 Nov 2012 17:16:08.986 : Timeout=60000
DEBUG [SshKeyPairFactory] 5 Nov 2012 17:16:08.987 : Setting preferred keypair = ssh-rsa
DEBUG [TransportProtocolCommon] 5 Nov 2012 17:16:08.987 : Starting transport protocol
DEBUG [TransportProtocolCommon] 5 Nov 2012 17:16:08.994 : Wait for state update timeout=60000
DEBUG [TransportProtocolCommon] 5 Nov 2012 17:16:08.995 : Registering transport protocol messages with inputstream
INFO [cryptix] 5 Nov 2012 17:16:09.017 : GLOBAL_TRACE=false
INFO [cryptix] 5 Nov 2012 17:16:09.017 : GLOBAL_DEBUG=false
INFO [cryptix] 5 Nov 2012 17:16:09.017 : GLOBAL_DEBUG_SLOW=false
DEBUG [TransportProtocolCommon] 5 Nov 2012 17:16:09.018 : Negotiating protocol version
DEBUG [TransportProtocolCommon] 5 Nov 2012 17:16:09.018 : Local identification: SSH-2.0-edtFTPjPRO-4.3.0
'
DEBUG [TransportProtocolCommon] 5 Nov 2012 17:16:09.066 : EOL is guessed at CR+LF
DEBUG [TransportProtocolCommon] 5 Nov 2012 17:16:09.067 : Remote identification: 'SSH-2.0-mod_sftp/0.9.7'
DEBUG [TransportProtocolCommon] 5 Nov 2012 17:16:09.067 : Protocol negotiation complete
DEBUG [TransportProtocolCommon] 5 Nov 2012 17:16:09.068 : Name=SSH_MSG_KEX_INIT,MessageId=20
Supported Kex diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1
Supported Public Keys ssh-rsa,ssh-dss
Supported Encryption Client->Server aes128-cbc,3des-cbc,aes192-cbc,aes256-cbc,aes128-ctr,aes192-ctr,aes256-ctr,blowfish-cbc,arcfour
Supported Encryption Server->Client aes128-cbc,3des-cbc,aes192-cbc,aes256-cbc,aes128-ctr,aes192-ctr,aes256-ctr,blowfish-cbc,arcfour
Supported Mac Client->Server hmac-sha1,hmac-sha1-96,hmac-md5,hmac-md5-96
Supported Mac Server->Client hmac-sha1,hmac-sha1-96,hmac-md5,hmac-md5-96
Supported Compression Client->Server none,zlib,zlib@openssh.com
Supported Compression Server->Client none,zlib,zlib@openssh.com
Supported Languages Client->Server
Supported Languages Server->Client
First Kex Packet Follows [FALSE]
DEBUG [TransportProtocolCommon] 5 Nov 2012 17:16:09.070 : Sending SSH_MSG_KEX_INIT
DEBUG [TransportProtocolCommon] 5 Nov 2012 17:16:09.070 : Wait for state update timeout=60000
DEBUG [SshMsgKexInit] 5 Nov 2012 17:16:09.071 : Packetlength=644, Paddinglength=10
DEBUG [TransportProtocolCommon] 5 Nov 2012 17:16:09.072 : Received registered message: SSH_MSG_KEX_INIT
DEBUG [TransportProtocolCommon] 5 Nov 2012 17:16:09.072 : Received Name=SSH_MSG_KEX_INIT,MessageId=20
Supported Kex diffie-hellman-group-exchange-sha1,diffie-hellman-group14-sha1,diffie-hellman-group1-sha1,rsa1024-sha1
Supported Public Keys ssh-rsa,ssh-dss
Supported Encryption Client->Server aes256-ctr,aes192-ctr,aes128-ctr,aes256-cbc,aes192-cbc,aes128-cbc,blowfish-ctr,blowfish-cbc,cast128-cbc,arcfour256,arcfour128,3des-ctr,3des-cbc
Supported Encryption Server->Client aes256-ctr,aes192-ctr,aes128-ctr,aes256-cbc,aes192-cbc,aes128-cbc,blowfish-ctr,blowfish-cbc,cast128-cbc,arcfour256,arcfour128,3des-ctr,3des-cbc
Supported Mac Client->Server hmac-sha1,hmac-sha1-96,hmac-md5,hmac-md5-96,hmac-ripemd160
Supported Mac Server->Client hmac-sha1,hmac-sha1-96,hmac-md5,hmac-md5-96,hmac-ripemd160
Supported Compression Client->Server zlib@openssh.com,zlib,none
Supported Compression Server->Client zlib@openssh.com,zlib,none
Supported Languages Client->Server
Supported Languages Server->Client
First Kex Packet Follows [FALSE]
DEBUG [TransportProtocolCommon] 5 Nov 2012 17:16:09.075 : Starting key exchange
DEBUG [TransportProtocolCommon] 5 Nov 2012 17:16:09.075 : Determine Algorithm
DEBUG [TransportProtocolCommon] 5 Nov 2012 17:16:09.076 : Client Algorithms: [diffie-hellman-group1-sha1, diffie-hellman-group14-sha1, diffie-hellman-group-exchange-sha1]
DEBUG [TransportProtocolCommon] 5 Nov 2012 17:16:09.076 : Server Algorithms: [diffie-hellman-group-exchange-sha1, diffie-hellman-group14-sha1, diffie-hellman-group1-sha1, rsa1024-sha1]
DEBUG [TransportProtocolCommon] 5 Nov 2012 17:16:09.077 : Returning diffie-hellman-group1-sha1
DEBUG [TransportProtocolCommon] 5 Nov 2012 17:16:09.077 : Key exchange algorithm: diffie-hellman-group1-sha1
INFO [DhFixedGroup] 5 Nov 2012 17:16:09.078 : Starting client side key exchange.
DEBUG [TransportProtocolCommon] 5 Nov 2012 17:16:09.090 : Sending SSH_MSG_KEXDH_INIT
DEBUG [TransportProtocolCommon] 5 Nov 2012 17:16:09.174 : Received unregistered message: SSH_MSG_KEXDH_REPLY
DEBUG [DhFixedGroup] 5 Nov 2012 17:16:09.180 : calculateExchangeHash()
DEBUG [TransportProtocolCommon] 5 Nov 2012 17:16:09.184 : Verifying host pcpftp.pearsoned.com,216.74.181.60
DEBUG [TransportProtocolCommon] 5 Nov 2012 17:16:09.184 : Preferred algorithm ssh-rsa
DEBUG [TransportProtocolCommon] 5 Nov 2012 17:16:09.184 : Selected algorithm ssh-rsa
DEBUG [SshRsaPublicKey] 5 Nov 2012 17:16:09.185 : Signature length=143
DEBUG [SshRsaPublicKey] 5 Nov 2012 17:16:09.204 : Verifying signature (com.enterprisedt.cryptix.provider.rsa.SHA1_RSA_PKCS1Signature)
DEBUG [AbstractKnownHostsKeyVerification] 5 Nov 2012 17:16:09.209 : verifyHost - found matching entry for host 'pcpftp.pearsoned.com,216.74.181.60'
DEBUG [AbstractKnownHostsKeyVerification] 5 Nov 2012 17:16:09.210 : verifyHost - found matching algorithm 'ssh-rsa'
DEBUG [TransportProtocolCommon] 5 Nov 2012 17:16:09.211 : Sending SSH_MSG_NEWKEYS
DEBUG [TransportProtocolCommon] 5 Nov 2012 17:16:09.295 : Received registered message: SSH_MSG_NEWKEYS
DEBUG [TransportProtocolCommon] 5 Nov 2012 17:16:09.295 : Completing key exchange
DEBUG [TransportProtocolCommon] 5 Nov 2012 17:16:09.296 : Making keys from key exchange output
DEBUG [TransportProtocolCommon] 5 Nov 2012 17:16:09.297 : Creating algorithm objects
DEBUG [TransportProtocolCommon] 5 Nov 2012 17:16:09.297 : setupNewKeys
DEBUG [TransportProtocolCommon] 5 Nov 2012 17:16:09.297 : Determine Algorithm
DEBUG [TransportProtocolCommon] 5 Nov 2012 17:16:09.298 : Client Algorithms: [aes128-cbc, 3des-cbc, aes192-cbc, aes256-cbc, aes128-ctr, aes192-ctr, aes256-ctr, blowfish-cbc, arcfour]
DEBUG [TransportProtocolCommon] 5 Nov 2012 17:16:09.298 : Server Algorithms: [aes256-ctr, aes192-ctr, aes128-ctr, aes256-cbc, aes192-cbc, aes128-cbc, blowfish-ctr, blowfish-cbc, cast128-cbc, arcfour256, arcfour128, 3des-ctr, 3des-cbc]
DEBUG [TransportProtocolCommon] 5 Nov 2012 17:16:09.299 : Returning aes128-cbc
DEBUG [SshC