2017-02-01 04:34:11 +08:00
|
|
|
---
|
|
|
|
title: "SFTP"
|
|
|
|
description: "SFTP"
|
|
|
|
---
|
|
|
|
|
2020-05-22 19:22:52 +08:00
|
|
|
{{< icon "fa fa-server" >}} SFTP
|
2017-02-01 04:34:11 +08:00
|
|
|
----------------------------------------
|
|
|
|
|
|
|
|
SFTP is the [Secure (or SSH) File Transfer
|
|
|
|
Protocol](https://en.wikipedia.org/wiki/SSH_File_Transfer_Protocol).
|
|
|
|
|
2019-08-08 14:57:51 +08:00
|
|
|
The SFTP backend can be used with a number of different providers:
|
|
|
|
|
2020-05-22 23:45:37 +08:00
|
|
|
{{< provider_list >}}
|
|
|
|
{{< provider name="C14" home="https://www.online.net/en/storage/c14-cold-storage" config="/sftp/#c14">}}
|
|
|
|
{{< provider name="rsync.net" home="https://rsync.net/products/rclone.html" config="/sftp/#rsync-net">}}
|
|
|
|
{{< /provider_list >}}
|
2019-08-08 15:03:02 +08:00
|
|
|
|
2018-04-19 17:15:54 +08:00
|
|
|
SFTP runs over SSH v2 and is installed as standard with most modern
|
|
|
|
SSH installations.
|
2017-02-01 04:34:11 +08:00
|
|
|
|
|
|
|
Paths are specified as `remote:path`. If the path does not begin with
|
|
|
|
a `/` it is relative to the home directory of the user. An empty path
|
2017-10-16 09:27:59 +08:00
|
|
|
`remote:` refers to the user's home directory.
|
2017-02-01 04:34:11 +08:00
|
|
|
|
2019-06-14 21:20:38 +08:00
|
|
|
"Note that some SFTP servers will need the leading / - Synology is a
|
|
|
|
good example of this. rsync.net, on the other hand, requires users to
|
|
|
|
OMIT the leading /.
|
2018-04-19 17:15:54 +08:00
|
|
|
|
2017-10-16 09:27:59 +08:00
|
|
|
Here is an example of making an SFTP configuration. First run
|
2017-02-01 04:34:11 +08:00
|
|
|
|
|
|
|
rclone config
|
|
|
|
|
2017-06-23 23:25:35 +08:00
|
|
|
This will guide you through an interactive setup process.
|
|
|
|
|
2017-02-01 04:34:11 +08:00
|
|
|
```
|
|
|
|
No remotes found - make a new one
|
|
|
|
n) New remote
|
|
|
|
s) Set configuration password
|
|
|
|
q) Quit config
|
2017-06-23 23:25:35 +08:00
|
|
|
n/s/q> n
|
2017-02-01 04:34:11 +08:00
|
|
|
name> remote
|
|
|
|
Type of storage to configure.
|
|
|
|
Choose a number from below, or type in your own value
|
2019-08-26 17:47:17 +08:00
|
|
|
[snip]
|
|
|
|
XX / SSH/SFTP Connection
|
2017-02-01 04:34:11 +08:00
|
|
|
\ "sftp"
|
2019-08-26 17:47:17 +08:00
|
|
|
[snip]
|
2017-05-25 06:24:46 +08:00
|
|
|
Storage> sftp
|
2017-02-01 04:34:11 +08:00
|
|
|
SSH host to connect to
|
|
|
|
Choose a number from below, or type in your own value
|
|
|
|
1 / Connect to example.com
|
|
|
|
\ "example.com"
|
|
|
|
host> example.com
|
2020-09-27 18:40:58 +08:00
|
|
|
SSH username, leave blank for current username, $USER
|
2017-06-23 23:25:35 +08:00
|
|
|
user> sftpuser
|
2017-05-25 06:24:46 +08:00
|
|
|
SSH port, leave blank to use default (22)
|
2019-07-10 20:23:02 +08:00
|
|
|
port>
|
2017-06-23 23:25:35 +08:00
|
|
|
SSH password, leave blank to use ssh-agent.
|
2017-02-01 04:34:11 +08:00
|
|
|
y) Yes type in my own password
|
|
|
|
g) Generate random password
|
|
|
|
n) No leave this optional password blank
|
|
|
|
y/g/n> n
|
2017-06-23 23:25:35 +08:00
|
|
|
Path to unencrypted PEM-encoded private key file, leave blank to use ssh-agent.
|
2019-07-10 20:23:02 +08:00
|
|
|
key_file>
|
2017-02-01 04:34:11 +08:00
|
|
|
Remote config
|
|
|
|
--------------------
|
|
|
|
[remote]
|
|
|
|
host = example.com
|
2017-06-23 23:25:35 +08:00
|
|
|
user = sftpuser
|
2019-07-10 20:23:02 +08:00
|
|
|
port =
|
|
|
|
pass =
|
|
|
|
key_file =
|
2017-02-01 04:34:11 +08:00
|
|
|
--------------------
|
|
|
|
y) Yes this is OK
|
|
|
|
e) Edit this remote
|
|
|
|
d) Delete this remote
|
|
|
|
y/e/d> y
|
|
|
|
```
|
|
|
|
|
2017-10-16 09:27:59 +08:00
|
|
|
This remote is called `remote` and can now be used like this:
|
2017-02-01 04:34:11 +08:00
|
|
|
|
|
|
|
See all directories in the home directory
|
|
|
|
|
|
|
|
rclone lsd remote:
|
|
|
|
|
|
|
|
Make a new directory
|
|
|
|
|
|
|
|
rclone mkdir remote:path/to/directory
|
|
|
|
|
|
|
|
List the contents of a directory
|
|
|
|
|
|
|
|
rclone ls remote:path/to/directory
|
|
|
|
|
|
|
|
Sync `/home/local/directory` to the remote directory, deleting any
|
|
|
|
excess files in the directory.
|
|
|
|
|
2020-06-06 00:04:23 +08:00
|
|
|
rclone sync -i /home/local/directory remote:directory
|
2017-02-01 04:34:11 +08:00
|
|
|
|
2017-06-23 23:25:35 +08:00
|
|
|
### SSH Authentication ###
|
|
|
|
|
2017-10-16 09:27:59 +08:00
|
|
|
The SFTP remote supports three authentication methods:
|
2017-06-23 23:25:35 +08:00
|
|
|
|
|
|
|
* Password
|
2020-09-25 02:51:35 +08:00
|
|
|
* Key file, including certificate signed keys
|
2017-06-23 23:25:35 +08:00
|
|
|
* ssh-agent
|
|
|
|
|
2019-01-03 19:25:13 +08:00
|
|
|
Key files should be PEM-encoded private key files. For instance `/home/$USER/.ssh/id_rsa`.
|
|
|
|
Only unencrypted OpenSSH or PEM encrypted files are supported.
|
2017-06-23 23:25:35 +08:00
|
|
|
|
2020-05-19 18:55:38 +08:00
|
|
|
The key file can be specified in either an external file (key_file) or contained within the
|
|
|
|
rclone config file (key_pem). If using key_pem in the config file, the entry should be on a
|
|
|
|
single line with new line ('\n' or '\r\n') separating lines. i.e.
|
|
|
|
|
|
|
|
key_pem = -----BEGIN RSA PRIVATE KEY-----\nMaMbaIXtE\n0gAMbMbaSsd\nMbaass\n-----END RSA PRIVATE KEY-----
|
|
|
|
|
|
|
|
This will generate it correctly for key_pem for use in the config:
|
|
|
|
|
|
|
|
awk '{printf "%s\\n", $0}' < ~/.ssh/id_rsa
|
|
|
|
|
|
|
|
If you don't specify `pass`, `key_file`, or `key_pem` then rclone will attempt to contact an ssh-agent.
|
2019-01-03 19:25:13 +08:00
|
|
|
|
|
|
|
You can also specify `key_use_agent` to force the usage of an ssh-agent. In this case
|
2020-05-19 18:55:38 +08:00
|
|
|
`key_file` or `key_pem` can also be specified to force the usage of a specific key in the ssh-agent.
|
2019-01-03 19:25:13 +08:00
|
|
|
|
|
|
|
Using an ssh-agent is the only way to load encrypted OpenSSH keys at the moment.
|
2017-06-23 23:25:35 +08:00
|
|
|
|
2018-03-15 07:17:09 +08:00
|
|
|
If you set the `--sftp-ask-password` option, rclone will prompt for a
|
|
|
|
password when needed and no password has been configured.
|
|
|
|
|
2020-09-25 02:51:35 +08:00
|
|
|
If you have a certificate then you can provide the path to the public key that contains the certificate. For example:
|
|
|
|
|
|
|
|
```
|
|
|
|
[remote]
|
|
|
|
type = sftp
|
|
|
|
host = example.com
|
|
|
|
user = sftpuser
|
|
|
|
key_file = ~/id_rsa
|
|
|
|
pubkey_file = ~/id_rsa-cert.pub
|
|
|
|
````
|
|
|
|
|
|
|
|
If you concatenate a cert with a private key then you can specify the
|
|
|
|
merged file in both places.
|
|
|
|
|
|
|
|
Note: the cert must come first in the file. e.g.
|
|
|
|
|
|
|
|
```
|
|
|
|
cat id_rsa-cert.pub id_rsa > merged_key
|
|
|
|
```
|
|
|
|
|
2020-10-04 09:03:19 +08:00
|
|
|
### Host key validation ###
|
|
|
|
|
|
|
|
By default rclone will not check the server's host key for validation. This
|
|
|
|
can allow an attacker to replace a server with their own and if you use
|
|
|
|
password authentication then this can lead to that password being exposed.
|
|
|
|
|
|
|
|
Host key matching, using standard `known_hosts` files can be turned on by
|
|
|
|
enabling the `known_hosts_file` option. This can point to the file maintained
|
|
|
|
by `OpenSSH` or can point to a unique file.
|
|
|
|
|
|
|
|
e.g.
|
|
|
|
|
|
|
|
```
|
|
|
|
[remote]
|
|
|
|
type = sftp
|
|
|
|
host = example.com
|
|
|
|
user = sftpuser
|
|
|
|
pass =
|
|
|
|
known_hosts_file = ~/.ssh/known_hosts
|
|
|
|
````
|
|
|
|
|
|
|
|
There are some limitations:
|
|
|
|
|
|
|
|
* `rclone` will not _manage_ this file for you. If the key is missing or
|
|
|
|
wrong then the connection will be refused.
|
|
|
|
* If the server is set up for a certificate host key then the entry in
|
|
|
|
the `known_hosts` file _must_ be the `@cert-authority` entry for the CA
|
|
|
|
* Unlike `OpenSSH`, the libraries used by `rclone` do not permit (at time
|
|
|
|
of writing) multiple host keys to be listed for a server. Only the first
|
|
|
|
entry is used.
|
|
|
|
|
|
|
|
If the host key provided by the server does not match the one in the
|
|
|
|
file (or is missing) then the connection will be aborted and an error
|
|
|
|
returned such as
|
|
|
|
|
|
|
|
NewFs: couldn't connect SSH: ssh: handshake failed: knownhosts: key mismatch
|
|
|
|
|
|
|
|
or
|
|
|
|
|
|
|
|
NewFs: couldn't connect SSH: ssh: handshake failed: knownhosts: key is unknown
|
|
|
|
|
|
|
|
If you see an error such as
|
|
|
|
|
|
|
|
NewFs: couldn't connect SSH: ssh: handshake failed: ssh: no authorities for hostname: example.com:22
|
|
|
|
|
|
|
|
then it is likely the server has presented a CA signed host certificate
|
|
|
|
and you will need to add the appropriate `@cert-authority` entry.
|
|
|
|
|
|
|
|
The `known_hosts_file` setting can be set during `rclone config` as an
|
|
|
|
advanced option.
|
|
|
|
|
2017-06-23 23:25:35 +08:00
|
|
|
### ssh-agent on macOS ###
|
|
|
|
|
|
|
|
Note that there seem to be various problems with using an ssh-agent on
|
|
|
|
macOS due to recent changes in the OS. The most effective work-around
|
2020-10-14 05:49:58 +08:00
|
|
|
seems to be to start an ssh-agent in each session, e.g.
|
2017-06-23 23:25:35 +08:00
|
|
|
|
|
|
|
eval `ssh-agent -s` && ssh-add -A
|
|
|
|
|
|
|
|
And then at the end of the session
|
|
|
|
|
|
|
|
eval `ssh-agent -k`
|
|
|
|
|
|
|
|
These commands can be used in scripts of course.
|
|
|
|
|
2017-02-01 04:34:11 +08:00
|
|
|
### Modified time ###
|
|
|
|
|
|
|
|
Modified times are stored on the server to 1 second precision.
|
|
|
|
|
|
|
|
Modified times are used in syncing and are fully supported.
|
|
|
|
|
2018-01-04 22:52:47 +08:00
|
|
|
Some SFTP servers disable setting/modifying the file modification time after
|
|
|
|
upload (for example, certain configurations of ProFTPd with mod_sftp). If you
|
|
|
|
are using one of these servers, you can set the option `set_modtime = false` in
|
|
|
|
your RClone backend configuration to disable this behaviour.
|
|
|
|
|
2020-05-22 19:22:52 +08:00
|
|
|
{{< rem autogenerated options start" - DO NOT EDIT - instead edit fs.RegInfo in backend/sftp/sftp.go then run make backenddocs" >}}
|
2018-10-02 03:48:54 +08:00
|
|
|
### Standard Options
|
|
|
|
|
|
|
|
Here are the standard options specific to sftp (SSH/SFTP Connection).
|
|
|
|
|
|
|
|
#### --sftp-host
|
|
|
|
|
|
|
|
SSH host to connect to
|
|
|
|
|
|
|
|
- Config: host
|
|
|
|
- Env Var: RCLONE_SFTP_HOST
|
|
|
|
- Type: string
|
|
|
|
- Default: ""
|
|
|
|
- Examples:
|
|
|
|
- "example.com"
|
|
|
|
- Connect to example.com
|
|
|
|
|
|
|
|
#### --sftp-user
|
|
|
|
|
2020-09-27 18:40:58 +08:00
|
|
|
SSH username, leave blank for current username, $USER
|
2018-10-02 03:48:54 +08:00
|
|
|
|
|
|
|
- Config: user
|
|
|
|
- Env Var: RCLONE_SFTP_USER
|
|
|
|
- Type: string
|
|
|
|
- Default: ""
|
|
|
|
|
|
|
|
#### --sftp-port
|
|
|
|
|
|
|
|
SSH port, leave blank to use default (22)
|
|
|
|
|
|
|
|
- Config: port
|
|
|
|
- Env Var: RCLONE_SFTP_PORT
|
|
|
|
- Type: string
|
|
|
|
- Default: ""
|
|
|
|
|
|
|
|
#### --sftp-pass
|
|
|
|
|
|
|
|
SSH password, leave blank to use ssh-agent.
|
|
|
|
|
2020-09-02 23:59:04 +08:00
|
|
|
**NB** Input to this must be obscured - see [rclone obscure](/commands/rclone_obscure/).
|
|
|
|
|
2018-10-02 03:48:54 +08:00
|
|
|
- Config: pass
|
|
|
|
- Env Var: RCLONE_SFTP_PASS
|
|
|
|
- Type: string
|
|
|
|
- Default: ""
|
|
|
|
|
2020-05-22 19:22:52 +08:00
|
|
|
#### --sftp-key-pem
|
|
|
|
|
|
|
|
Raw PEM-encoded private key, If specified, will override key_file parameter.
|
|
|
|
|
|
|
|
- Config: key_pem
|
|
|
|
- Env Var: RCLONE_SFTP_KEY_PEM
|
|
|
|
- Type: string
|
|
|
|
- Default: ""
|
|
|
|
|
2018-10-02 03:48:54 +08:00
|
|
|
#### --sftp-key-file
|
|
|
|
|
2019-01-03 19:25:13 +08:00
|
|
|
Path to PEM-encoded private key file, leave blank or set key-use-agent to use ssh-agent.
|
2018-10-02 03:48:54 +08:00
|
|
|
|
2020-09-02 23:59:04 +08:00
|
|
|
Leading `~` will be expanded in the file name as will environment variables such as `${RCLONE_CONFIG_DIR}`.
|
|
|
|
|
|
|
|
|
2018-10-02 03:48:54 +08:00
|
|
|
- Config: key_file
|
|
|
|
- Env Var: RCLONE_SFTP_KEY_FILE
|
|
|
|
- Type: string
|
|
|
|
- Default: ""
|
|
|
|
|
2019-01-03 19:24:31 +08:00
|
|
|
#### --sftp-key-file-pass
|
|
|
|
|
|
|
|
The passphrase to decrypt the PEM-encoded private key file.
|
|
|
|
|
|
|
|
Only PEM encrypted key files (old OpenSSH format) are supported. Encrypted keys
|
|
|
|
in the new OpenSSH format can't be used.
|
|
|
|
|
2020-09-02 23:59:04 +08:00
|
|
|
**NB** Input to this must be obscured - see [rclone obscure](/commands/rclone_obscure/).
|
|
|
|
|
2019-01-03 19:24:31 +08:00
|
|
|
- Config: key_file_pass
|
|
|
|
- Env Var: RCLONE_SFTP_KEY_FILE_PASS
|
|
|
|
- Type: string
|
|
|
|
- Default: ""
|
|
|
|
|
2020-09-25 02:51:35 +08:00
|
|
|
#### --sftp-pubkey-file
|
|
|
|
|
2020-09-27 18:40:58 +08:00
|
|
|
Optional path to public key file.
|
|
|
|
|
|
|
|
Set this if you have a signed certificate you want to use for authentication.
|
2020-09-25 02:51:35 +08:00
|
|
|
|
|
|
|
Leading `~` will be expanded in the file name as will environment variables such as `${RCLONE_CONFIG_DIR}`.
|
|
|
|
|
|
|
|
|
|
|
|
- Config: pubkey_file
|
|
|
|
- Env Var: RCLONE_SFTP_PUBKEY_FILE
|
|
|
|
- Type: string
|
|
|
|
- Default: ""
|
|
|
|
|
2019-01-03 19:25:13 +08:00
|
|
|
#### --sftp-key-use-agent
|
|
|
|
|
|
|
|
When set forces the usage of the ssh-agent.
|
|
|
|
|
|
|
|
When key-file is also set, the ".pub" file of the specified key-file is read and only the associated key is
|
|
|
|
requested from the ssh-agent. This allows to avoid `Too many authentication failures for *username*` errors
|
|
|
|
when the ssh-agent contains many keys.
|
|
|
|
|
|
|
|
- Config: key_use_agent
|
|
|
|
- Env Var: RCLONE_SFTP_KEY_USE_AGENT
|
|
|
|
- Type: bool
|
|
|
|
- Default: false
|
|
|
|
|
2018-10-02 03:48:54 +08:00
|
|
|
#### --sftp-use-insecure-cipher
|
|
|
|
|
2019-10-26 18:04:54 +08:00
|
|
|
Enable the use of insecure ciphers and key exchange methods.
|
|
|
|
|
2020-05-27 23:11:47 +08:00
|
|
|
This enables the use of the following insecure ciphers and key exchange methods:
|
2019-10-26 18:04:54 +08:00
|
|
|
|
|
|
|
- aes128-cbc
|
|
|
|
- aes192-cbc
|
|
|
|
- aes256-cbc
|
|
|
|
- 3des-cbc
|
|
|
|
- diffie-hellman-group-exchange-sha256
|
|
|
|
- diffie-hellman-group-exchange-sha1
|
|
|
|
|
|
|
|
Those algorithms are insecure and may allow plaintext data to be recovered by an attacker.
|
2018-10-02 03:48:54 +08:00
|
|
|
|
|
|
|
- Config: use_insecure_cipher
|
|
|
|
- Env Var: RCLONE_SFTP_USE_INSECURE_CIPHER
|
|
|
|
- Type: bool
|
|
|
|
- Default: false
|
|
|
|
- Examples:
|
|
|
|
- "false"
|
|
|
|
- Use default Cipher list.
|
|
|
|
- "true"
|
2019-07-10 20:23:02 +08:00
|
|
|
- Enables the use of the aes128-cbc cipher and diffie-hellman-group-exchange-sha256, diffie-hellman-group-exchange-sha1 key exchange.
|
2018-10-02 03:48:54 +08:00
|
|
|
|
|
|
|
#### --sftp-disable-hashcheck
|
|
|
|
|
|
|
|
Disable the execution of SSH commands to determine if remote file hashing is available.
|
|
|
|
Leave blank or set to false to enable hashing (recommended), set to true to disable hashing.
|
|
|
|
|
|
|
|
- Config: disable_hashcheck
|
|
|
|
- Env Var: RCLONE_SFTP_DISABLE_HASHCHECK
|
|
|
|
- Type: bool
|
|
|
|
- Default: false
|
|
|
|
|
|
|
|
### Advanced Options
|
|
|
|
|
|
|
|
Here are the advanced options specific to sftp (SSH/SFTP Connection).
|
|
|
|
|
2020-10-04 09:03:19 +08:00
|
|
|
#### --sftp-known-hosts-file
|
|
|
|
|
|
|
|
Optional path to known_hosts file.
|
|
|
|
|
|
|
|
Set this value to enable server host key validation.
|
|
|
|
|
|
|
|
Leading `~` will be expanded in the file name as will environment variables such as `${RCLONE_CONFIG_DIR}`.
|
|
|
|
|
|
|
|
|
|
|
|
- Config: known_hosts_file
|
|
|
|
- Env Var: RCLONE_SFTP_KNOWN_HOSTS_FILE
|
|
|
|
- Type: string
|
|
|
|
- Default: ""
|
|
|
|
- Examples:
|
|
|
|
- "~/.ssh/known_hosts"
|
|
|
|
- Use OpenSSH's known_hosts file
|
|
|
|
|
2018-10-02 03:48:54 +08:00
|
|
|
#### --sftp-ask-password
|
|
|
|
|
|
|
|
Allow asking for SFTP password when needed.
|
|
|
|
|
2019-10-26 18:04:54 +08:00
|
|
|
If this is set and no password is supplied then rclone will:
|
|
|
|
- ask for a password
|
|
|
|
- not contact the ssh agent
|
|
|
|
|
|
|
|
|
2018-10-02 03:48:54 +08:00
|
|
|
- Config: ask_password
|
|
|
|
- Env Var: RCLONE_SFTP_ASK_PASSWORD
|
|
|
|
- Type: bool
|
|
|
|
- Default: false
|
|
|
|
|
|
|
|
#### --sftp-path-override
|
|
|
|
|
|
|
|
Override path used by SSH connection.
|
|
|
|
|
|
|
|
This allows checksum calculation when SFTP and SSH paths are
|
|
|
|
different. This issue affects among others Synology NAS boxes.
|
|
|
|
|
|
|
|
Shared folders can be found in directories representing volumes
|
|
|
|
|
2020-09-02 23:59:04 +08:00
|
|
|
rclone sync /home/local/directory remote:/directory --ssh-path-override /volume2/directory
|
2018-10-02 03:48:54 +08:00
|
|
|
|
|
|
|
Home directory can be found in a shared folder called "home"
|
|
|
|
|
2020-09-02 23:59:04 +08:00
|
|
|
rclone sync /home/local/directory remote:/home/directory --ssh-path-override /volume1/homes/USER/directory
|
2018-10-02 03:48:54 +08:00
|
|
|
|
|
|
|
- Config: path_override
|
|
|
|
- Env Var: RCLONE_SFTP_PATH_OVERRIDE
|
|
|
|
- Type: string
|
|
|
|
- Default: ""
|
|
|
|
|
|
|
|
#### --sftp-set-modtime
|
|
|
|
|
|
|
|
Set the modified time on the remote if set.
|
|
|
|
|
|
|
|
- Config: set_modtime
|
|
|
|
- Env Var: RCLONE_SFTP_SET_MODTIME
|
|
|
|
- Type: bool
|
|
|
|
- Default: true
|
|
|
|
|
2019-08-26 22:25:20 +08:00
|
|
|
#### --sftp-md5sum-command
|
|
|
|
|
|
|
|
The command used to read md5 hashes. Leave blank for autodetect.
|
|
|
|
|
|
|
|
- Config: md5sum_command
|
|
|
|
- Env Var: RCLONE_SFTP_MD5SUM_COMMAND
|
|
|
|
- Type: string
|
|
|
|
- Default: ""
|
|
|
|
|
|
|
|
#### --sftp-sha1sum-command
|
|
|
|
|
|
|
|
The command used to read sha1 hashes. Leave blank for autodetect.
|
|
|
|
|
|
|
|
- Config: sha1sum_command
|
|
|
|
- Env Var: RCLONE_SFTP_SHA1SUM_COMMAND
|
|
|
|
- Type: string
|
|
|
|
- Default: ""
|
|
|
|
|
2020-02-01 18:31:42 +08:00
|
|
|
#### --sftp-skip-links
|
|
|
|
|
|
|
|
Set to skip any symlinks and any other non regular files.
|
|
|
|
|
|
|
|
- Config: skip_links
|
|
|
|
- Env Var: RCLONE_SFTP_SKIP_LINKS
|
|
|
|
- Type: bool
|
|
|
|
- Default: false
|
|
|
|
|
2020-09-02 23:59:04 +08:00
|
|
|
#### --sftp-subsystem
|
|
|
|
|
|
|
|
Specifies the SSH2 subsystem on the remote host.
|
|
|
|
|
|
|
|
- Config: subsystem
|
|
|
|
- Env Var: RCLONE_SFTP_SUBSYSTEM
|
|
|
|
- Type: string
|
|
|
|
- Default: "sftp"
|
|
|
|
|
|
|
|
#### --sftp-server-command
|
|
|
|
|
|
|
|
Specifies the path or command to run a sftp server on the remote host.
|
|
|
|
|
|
|
|
The subsystem option is ignored when server_command is defined.
|
|
|
|
|
|
|
|
- Config: server_command
|
|
|
|
- Env Var: RCLONE_SFTP_SERVER_COMMAND
|
|
|
|
- Type: string
|
|
|
|
- Default: ""
|
|
|
|
|
2021-02-02 21:42:35 +08:00
|
|
|
#### --sftp-use-fstat
|
|
|
|
|
|
|
|
If set use fstat instead of stat
|
|
|
|
|
|
|
|
Some servers limit the amount of open files and calling Stat after opening
|
|
|
|
the file will throw an error from the server. Setting this flag will call
|
|
|
|
Fstat instead of Stat which is called on an already open file handle.
|
|
|
|
|
|
|
|
It has been found that this helps with IBM Sterling SFTP servers which have
|
|
|
|
"extractability" level set to 1 which means only 1 file can be opened at
|
|
|
|
any given time.
|
|
|
|
|
|
|
|
|
|
|
|
- Config: use_fstat
|
|
|
|
- Env Var: RCLONE_SFTP_USE_FSTAT
|
|
|
|
- Type: bool
|
|
|
|
- Default: false
|
|
|
|
|
2021-04-01 02:12:08 +08:00
|
|
|
#### --sftp-disable-concurrent-reads
|
|
|
|
|
|
|
|
If set don't use concurrent reads
|
|
|
|
|
|
|
|
Normally concurrent reads are safe to use and not using them will
|
|
|
|
degrade performance, so this option is disabled by default.
|
|
|
|
|
|
|
|
Some servers limit the amount number of times a file can be
|
|
|
|
downloaded. Using concurrent reads can trigger this limit, so if you
|
|
|
|
have a server which returns
|
|
|
|
|
|
|
|
Failed to copy: file does not exist
|
|
|
|
|
|
|
|
Then you may need to enable this flag.
|
|
|
|
|
|
|
|
If concurrent reads are disabled, the use_fstat option is ignored.
|
|
|
|
|
|
|
|
|
|
|
|
- Config: disable_concurrent_reads
|
|
|
|
- Env Var: RCLONE_SFTP_DISABLE_CONCURRENT_READS
|
|
|
|
- Type: bool
|
|
|
|
- Default: false
|
|
|
|
|
|
|
|
#### --sftp-idle-timeout
|
|
|
|
|
|
|
|
Max time before closing idle connections
|
|
|
|
|
|
|
|
If no connections have been returned to the connection pool in the time
|
|
|
|
given, rclone will empty the connection pool.
|
|
|
|
|
|
|
|
Set to 0 to keep connections indefinitely.
|
|
|
|
|
|
|
|
|
|
|
|
- Config: idle_timeout
|
|
|
|
- Env Var: RCLONE_SFTP_IDLE_TIMEOUT
|
|
|
|
- Type: Duration
|
|
|
|
- Default: 1m0s
|
|
|
|
|
2020-05-22 19:22:52 +08:00
|
|
|
{{< rem autogenerated options stop >}}
|
2018-10-02 01:36:15 +08:00
|
|
|
|
2017-02-01 04:34:11 +08:00
|
|
|
### Limitations ###
|
|
|
|
|
2017-08-06 18:49:52 +08:00
|
|
|
SFTP supports checksums if the same login has shell access and `md5sum`
|
|
|
|
or `sha1sum` as well as `echo` are in the remote's PATH.
|
2018-04-21 03:49:49 +08:00
|
|
|
This remote checksumming (file hashing) is recommended and enabled by default.
|
|
|
|
Disabling the checksumming may be required if you are connecting to SFTP servers
|
2018-01-05 17:01:35 +08:00
|
|
|
which are not under your control, and to which the execution of remote commands
|
2018-04-21 03:49:49 +08:00
|
|
|
is prohibited. Set the configuration option `disable_hashcheck` to `true` to
|
|
|
|
disable checksumming.
|
2017-02-01 04:34:11 +08:00
|
|
|
|
2019-05-14 21:09:20 +08:00
|
|
|
SFTP also supports `about` if the same login has shell
|
|
|
|
access and `df` are in the remote's PATH. `about` will
|
|
|
|
return the total space, free space, and used space on the remote
|
|
|
|
for the disk of the specified path on the remote or, if not set,
|
|
|
|
the disk of the root on the remote.
|
|
|
|
`about` will fail if it does not have shell
|
2019-07-10 20:23:02 +08:00
|
|
|
access or if `df` is not in the remote's PATH.
|
2019-05-14 21:09:20 +08:00
|
|
|
|
2020-10-14 05:49:58 +08:00
|
|
|
Note that some SFTP servers (e.g. Synology) the paths are different for
|
2018-04-19 17:15:54 +08:00
|
|
|
SSH and SFTP so the hashes can't be calculated properly. For them
|
|
|
|
using `disable_hashcheck` is a good idea.
|
|
|
|
|
2017-10-28 14:03:51 +08:00
|
|
|
The only ssh agent supported under Windows is Putty's pageant.
|
2017-04-10 21:50:06 +08:00
|
|
|
|
2017-12-08 20:22:09 +08:00
|
|
|
The Go SSH library disables the use of the aes128-cbc cipher by
|
|
|
|
default, due to security concerns. This can be re-enabled on a
|
|
|
|
per-connection basis by setting the `use_insecure_cipher` setting in
|
|
|
|
the configuration file to `true`. Further details on the insecurity of
|
2021-02-17 06:24:11 +08:00
|
|
|
this cipher can be found
|
|
|
|
[in this paper](http://www.isg.rhul.ac.uk/~kp/SandPfinal.pdf).
|
2017-12-08 20:22:09 +08:00
|
|
|
|
2017-02-01 04:34:11 +08:00
|
|
|
SFTP isn't supported under plan9 until [this
|
|
|
|
issue](https://github.com/pkg/sftp/issues/156) is fixed.
|
|
|
|
|
|
|
|
Note that since SFTP isn't HTTP based the following flags don't work
|
|
|
|
with it: `--dump-headers`, `--dump-bodies`, `--dump-auth`
|
|
|
|
|
|
|
|
Note that `--timeout` isn't supported (but `--contimeout` is).
|
2019-08-08 14:57:51 +08:00
|
|
|
|
|
|
|
|
|
|
|
## C14 {#c14}
|
|
|
|
|
|
|
|
C14 is supported through the SFTP backend.
|
|
|
|
|
|
|
|
See [C14's documentation](https://www.online.net/en/storage/c14-cold-storage)
|
2019-08-08 15:03:02 +08:00
|
|
|
|
|
|
|
## rsync.net {#rsync-net}
|
|
|
|
|
|
|
|
rsync.net is supported through the SFTP backend.
|
|
|
|
|
|
|
|
See [rsync.net's documentation of rclone examples](https://www.rsync.net/products/rclone.html).
|