/
Data Transmission

Data Transmission

Username and password will be provided at the beginning of the project.

Hostname

ftp-partner.digitecgalaxus.ch

Protocol

SFTP

Port

22

IP Addresses
Use hostname for connection and IPs only for whitelisting

88.198.35.84

85.10.200.14

116.203.25.19

 

By default, a maximum of 5 parallel sessions is possible.

To avoid data loss in case of connection problems, the sender should check the successful upload and, if necessary, automatically retransmit.

Files should be uploaded with complete content; otherwise, it may happen that our System downloads the files empty due to a timing overlap.
If this is not possible or if the files are first created empty on the FTP and only afterwards filled with content, the filename should temporarily be prefixed, e.g., tmp_GDELR_*.xml.

Applies only to the automation of order data:
After successful download/import, the files must be deleted from the FTP.

The SSL certificate is renewed annually and should be accepted automatically.

If the password is transmitted incorrectly multiple times or too many requests are sent, the IP address will be automatically temporarily blocked for 3 hours.

Supported Key Exchange Algorithms (KEX):

Supported KEX Algorithms:

  • ecdh-sha2-nistp256

  • ecdh-sha2-nistp384

  • ecdh-sha2-nistp521

  • diffie-hellman-group-exchange-sha256

  • diffie-hellman-group16-sha512

  • diffie-hellman-group14-sha256

  • diffie-hellman-group-exchange-sha1

  • diffie-hellman-group14-sha1

  • diffie-hellman-group1-sha1

Unsupported KEX Algorithm:

  • diffie-hellman-group18-sha512

Public Key Authentication Algorithms:

  • ssh-ed25519

  • sk-ssh-ed25519@openssh.com

  • sk-ecdsa-sha2-nistp256@openssh.com

  • ecdsa-sha2-nistp256

  • ecdsa-sha2-nistp384

  • ecdsa-sha2-nistp521

  • rsa-sha2-256

  • rsa-sha2-512

Message Authentication Code (MAC) Algorithms:

  • hmac-sha2-256-etm@openssh.com

  • hmac-sha2-256

Message Authentication Code (MAC) Algorithms:

  • aes128-gcm@openssh.com

  • aes256-gcm@openssh.com

  • chacha20-poly1305@openssh.com

  • aes128-ctr, aes192-ctr

  • aes256-ctr

Public Host Key:

ssh-rsa:

# ftp.digitecgalaxus.ch:22 SSH-2.0-SFTPGo_2.6.0 ftp.digitecgalaxus.ch ssh-rsa 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

ecdsa-sha2-nistp256

# ftp.digitecgalaxus.ch:22 SSH-2.0-SFTPGo_2.6.0 ftp.digitecgalaxus.ch ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBN+YVR7x8JFkUipf7sgh6iynBEqzIanc2iRAAMWefcOWKFiHW4P5pgjfAD/gb72po27L+OuqVs0UOI3PMztFObA=

ssh-ed25519

# ftp.digitecgalaxus.ch:22 SSH-2.0-SFTPGo_2.6.0 ftp.digitecgalaxus.ch ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHgyJzvzzPJ1wJBuuUIYTCL+SJkViVFqw12JhV1fd/QO

In the FTP client, one must manually confirm that the host key has changed and still wants to connect if the access data has been saved (Man in the middle Warning).

Unless it happens automatically, this must also be done manually when the connection is established via script. This can be done, for example, by:
ssh-keygen -R ftp.digitecgalaxus.ch
ssh user@ftp.digitecgalaxus.ch