Your browser does not allow storing cookies. We recommend enabling them.


ssh-capture (on Unix)

ssh-capture — Captures TCP connections for tunneling or FTP-SFTP conversion


ssh-capture [options...] COMMAND [arguments...]


ssh-capture is a component of Tectia ConnectSecure on Unix.

The ssh-capture command runs the specified command with the given arguments. The command and its child processes will have automatic TCP connection capturing enabled. Depending on the filter rules configured for the Tectia Connection Broker, the captured connections may then be converted from FTP to SFTP, tunneled, blocked, or passed through in plaintext.


The following options are available:

-D, --debug=LEVEL

Sets the debug level string to LEVEL. The following debug levels can be used:

  • 1 - includes information about fatal errors

  • 3 - includes initialization messages

  • 5 - includes information about the TCP connections

  • 7 - includes information about DNS resolving, and other more detailed debugging information.

-F, --fallback

Falls back to plaintext connection mode if a secure connection cannot be established (default: no fallback).

-l, --localhost

Enables capturing connections to the local host ( The default is to let local host connections pass through in plaintext.

Usually, there is no need to capture connections within the local host. For testing purposes and for generic scripts, capturing can be activated with this setting. Notice, however, that this setting stops the fallback option from working for FTP-SFTP conversion in case the Secure Shell server does not answer.

-h, --help

Displays a short summary of command-line options and exits.


The Tectia ConnectSecure software includes an example configuration for filter rules that enable FTP-SFTP conversion for any FTP connections (to port 21) and transparent tunneling of any telnet connections (to port 23). See the ssh-broker-config-example-capture.xml configuration file in the /etc/ssh2 directory. The examples below assume that the example configuration is used.

Start a telnet session to with transparent tunneling enabled:

$ ssh-capture telnet

Start an FTP session to with FTP-SFTP conversion enabled:

$ ssh-capture ftp

Start an FTP session to and allow the fallback to plaintext FTP in case the secure SFTP connection cannot be established:

$ ssh-capture -F ftp

Start an FTP session to local host with FTP-SFTP conversion enabled:

$ ssh-capture -l ftp

Start a bash shell session with connection capturing enabled for all commands:

$ ssh-capture bash

There are the following restrictions on capturing applications that have the 'Set User ID' (suid) bit set:

  • In general, suid applications can be captured only by the owner of the application.

  • As an exception, on AIX, selected suid applications can be captured by all users. These applications are /bin/ftp and /usr/bin/ftp.

    However, capturing these applications will not work from a captured shell session. To capture /bin/ftp or /usr/bin/ftp on AIX, the application must be started directly using the ssh-capture command:

    $ ssh-capture ftp <host-address>

Exit Values

If a command was invoked, ssh-capture returns the exit status of that command. Typically, the exit value shows the success of the command:

  • If an error occurred when executing the command, the exit value is non-zero. The exact value depends on the operating system.

  • If an error occurred when parsing the command-line arguments, an error message is output to stderr and the exit value is 1.

  • If the platform is unsupported, an error message is output to stderr and the exit value is 2.

  • If no errors occurred, the exit value is whatever the given command returns. So in this case the exit value may be nonzero even if the command succeeds. This means that the exit value alone does not provide exact information about how the command succeeded.




What to read next:

  • Reduce Secure Shell risk. Get to know the NIST 7966.

    The NISTIR 7966 guideline from the Computer Security Division of NIST is a direct call to action for organizations regardless of industry and is a mandate for the US Federal government.
    Download now
  • ISACA Practitioner Guide for SSH

    With contributions from practitioners, specialists and SSH.COM experts, the ISACA “SSH: Practitioner Considerations” guide is vital best practice from the compliance and audit community.
    Download now