Bug ID 1160805: The scp-checkfp fail to cat scp.whitelist for remote admin

Last Modified: May 18, 2024

Affected Product(s):
BIG-IP TMOS(all modules)

Known Affected Versions:,,,,,, 17.1.0,,,, 17.1.1,,,

Fixed In:
16.1.4, 15.1.9

Opened: Sep 22, 2022

Severity: 3-Major


Attempt SCP file to BIG-IP: /shared/images root user success remote admin user fails, following is an example: sinkhole3:~$ scp test.iso apiuser@ Password: cat: /co: No such file or directory cat: fig/ssh/scp.whitelist: No such file or directory "/shared/images/test.iso": path not allowed


SCP command is not working for the remote admin users.


-- Running BIG-IP version with fix for ID 1097193. -- Create remote admin user. -- Use SCP command to transfer a file to remote admin user path.



Fix Information

Issue is with the Internal Field Separation (IFS) environment variable from /bin/scp-checkfp file. Following is an example for IFS: IFS=$"\n" --> This means, it expects a string character. It should expect a character value to read the paths from the SCP files. IFS=$'\n' --> This means, it expects a character.

Behavior Change

Guides & references

K10134038: F5 Bug Tracker Filter Names and Tips