1.1 SCP Command Line-An Overview
The SCP command line is commonly used to copy files over SSH, and between popular Operating systems like Linux, Mac and Windows in a secure fashion. SCP is used to copy files to/from a remote server. It also allows you to copy files from one remote server to another remote server, without passing traffic through your PC.
1.2 Configuring the System of the Virtual Machine
At the outset, for sending files to the virtual machines, you would require a specific set of configuration, as explained below:
1. Open VirtualBox
2. Please select the virtual machine where your target system is running.
3. Open Settings > Network
4. Please select the correct Adapter tab (it will be the first one in case you have not made any changes so far)
5. You must select Bridged Adapter from the "Attached to" dropdown menu.
6. Now, you can run your virtual machine.
1.3 Initiating File Copy between Linux Servers Using SCP
Once begun, you must open a terminal and key in the following:
sudo apt-get install openssh-server
ifconfig
The ifconfig will throw up a few blocks, like the one titled eth0.
ctest@ctest-System-Product-Name ~ $ ifconfig eth0 Link encap:Ethernet HWaddr f4:6d:04:94:8f:17 inet addr:192.168.0.11 Bcast:192.168.0.255 Mask:255.255.255.0 inet6 addr: fe80::f66d:4ff:fe94:8f17/64 Scope:Link UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1 RX packets:234392 errors:0 dropped:0 overruns:0 frame:0 TX packets:128835 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:1000 RX bytes:332109021 (332.1 MB) TX bytes:11758082 (11.7 MB) Interrupt:43 Base address:0x6000 lo Link encap:Local Loopback inet addr:127.0.0.1 Mask:255.0.0.0 inet6 addr: ::1/128 Scope:Host UP LOOPBACK RUNNING MTU:16436 Metric:1 RX packets:39 errors:0 dropped:0 overruns:0 frame:0 TX packets:39 errors:0 dropped:0 overruns:0 carrier:0 collisions:0 txqueuelen:0 RX bytes:2424 (2.4 KB) TX bytes:2424 (2.4 KB) ctest@ctest-System-Product-Name ~ $
The IP address exhibited on inet address: is the one your machine would have in your internal network, and it will be the one you are going to access the machine under. Here, you must revisit the sender system now that you are aware of the IP of the receiver. If you possess the files to be sent, in addition to the directory for storing these on your virtual machine ready, you may simply go ahead and send the file by using the following command:
scp [path of file to send] root@[receiver's IP]:[target directory]
In the above command, you must replace the items in brackets [] with actual values.
For instance, if you wish to send a file titled MyVideo.mp4 housed in the /home/ctest/Videosdirectory to the /home/cooldude/Videos directory of the system that has an internal IP of 191.167.1.61, you must use the following command line:
scp /home/ctest/Videos/MyVideo.mp4 root@191.167.1.61:/home/cooldude/Videos
1.4 Fixing Errors
Post entering the basic SCP command, you may encounter the following message:
ctest@ctest-System-Product-Name ~ $ scp /home/ctest/Videos/MyVideo.mp4 root@191.167.1.61:/home/cooldude/Videos @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ @ WARNING: REMOTE HOST IDENTIFICATION HAS CHANGED! @ @@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@ IT IS POSSIBLE THAT SOMEONE IS DOING SOMETHING NASTY! Someone could be eavesdropping on you right now (man-in-the-middle attack)! It is also possible that a host key has just been changed. The fingerprint for the ECDSA key sent by the remote host is 4e:c0:50:9a:cf:b6:bc:45:ed:9b:54:97:d8:11:21:a8. Please contact your system administrator. Add correct host key in /home/ctest/.ssh/known_hosts to get rid of this message. Offending ECDSA key in /home/ctest/.ssh/known_hosts:4 remove with: ssh-keygen -f "/home/ctest/.ssh/known_hosts" -R 191.167.1.61 ECDSA host key for 191.167.1.61has changed and you have requested strict checking. Host key verification failed. lost connection ctest@ctest-System-Product-Name ~ $
More often than not, this is caused when the system with the given IP is no longer the same as it was when you last connected to the same IP. For instance, if you happened to host a new virtual machine that subsequently took the same IP as the old one.
To fix this one, you must follow the commands given in the message to remove the offending key (as shown below):
ssh-keygen -f "/home/ctest/.ssh/known_hosts" -R 191.167.1.61
You must ensure that you replace the path and the IP with the ones matching your specific inputs. You may also remove the key manually by opening the known_host file with the help of a text editor, and removing the key (obviously as root).
1.5 Completing the Process
If, however, you do not come across any such issue, or you have managed to tackle the same, you would be asked if you really wish to proceed. You must key in yes and hit Enter to confirm the same.
Next, you’ll be asked for the root password of the receiver, which you must key in and before hitting Enter once again.
Now, the copied file must be accessible on the intended directory of the receiver, although you must not have any permissions to write/execute the same. If, however, you are seeking full permissions, please use the following command:
sudo chmod 777 /home/cooldude/Videos/MyVideo.mp4
Here, you must remember to change the path value to the one corresponding to your file, and you are good to go!