1 .\" $OpenBSD: sftp.1,v 1.60 2004/12/05 23:55:07 jaredy Exp $
3 .\" Copyright (c) 2001 Damien Miller. All rights reserved.
5 .\" Redistribution and use in source and binary forms, with or without
6 .\" modification, are permitted provided that the following conditions
8 .\" 1. Redistributions of source code must retain the above copyright
9 .\" notice, this list of conditions and the following disclaimer.
10 .\" 2. Redistributions in binary form must reproduce the above copyright
11 .\" notice, this list of conditions and the following disclaimer in the
12 .\" documentation and/or other materials provided with the distribution.
14 .\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
15 .\" IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
16 .\" OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
17 .\" IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
18 .\" INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
19 .\" NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
20 .\" DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
21 .\" THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
22 .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
23 .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
30 .Nd secure file transfer program
35 .Op Fl B Ar buffer_size
37 .Op Fl F Ar ssh_config
38 .Op Fl o Ar ssh_option
39 .Op Fl P Ar sftp_server_path
40 .Op Fl R Ar num_requests
42 .Op Fl s Ar subsystem | sftp_server
46 .Oo Oo Ar user Ns @ Oc Ns
47 .Ar host Ns Oo : Ns Ar file Oo
50 .Oo Oo Ar user Ns @ Oc Ns
51 .Ar host Ns Oo : Ns Ar dir Ns
55 .Oo Ar user Ns @ Oc Ns Ar host
58 is an interactive file transfer program, similar to
60 which performs all operations over an encrypted
63 It may also use many features of ssh, such as public key authentication and
66 connects and logs into the specified
68 then enters an interactive command mode.
70 The second usage format will retrieve files automatically if a non-interactive
71 authentication method is used; otherwise it will do so after
72 successful interactive authentication.
74 The third usage format allows
76 to start in a remote directory.
78 The final usage format allows for automated sessions using the
81 In such cases, it is usually necessary to configure public key authentication
82 to obviate the need to enter a password at connection time (see
87 The options are as follows:
90 Specify the use of protocol version 1.
91 .It Fl B Ar buffer_size
92 Specify the size of the buffer that
94 uses when transferring files.
95 Larger buffers require fewer round trips at the cost of higher
97 The default is 32768 bytes.
99 Batch mode reads a series of commands from an input
103 Since it lacks user interaction it should be used in conjunction with
104 non-interactive authentication.
109 may be used to indicate standard input.
111 will abort if any of the following
113 .Ic get , put , rename , ln ,
114 .Ic rm , mkdir , chdir , ls ,
115 .Ic lchdir , chmod , chown , chgrp , lpwd
118 Termination on error can be suppressed on a command by command basis by
119 prefixing the command with a
121 character (for example,
122 .Ic -rm /tmp/blah* ) .
124 Enables compression (via ssh's
127 .It Fl F Ar ssh_config
128 Specifies an alternative
129 per-user configuration file for
131 This option is directly passed to
133 .It Fl o Ar ssh_option
134 Can be used to pass options to
136 in the format used in
138 This is useful for specifying options
139 for which there is no separate
142 For example, to specify an alternate port use:
144 For full details of the options listed below, and their possible values, see
147 .Bl -tag -width Ds -offset indent -compact
151 .It ChallengeResponseAuthentication
157 .It ConnectionAttempts
161 .It GlobalKnownHostsFile
162 .It GSSAPIAuthentication
163 .It GSSAPIDelegateCredentials
165 .It HostbasedAuthentication
166 .It HostKeyAlgorithms
171 .It KbdInteractiveDevices
174 .It NoHostAuthenticationForLocalhost
175 .It NumberOfPasswordPrompts
176 .It PasswordAuthentication
178 .It PreferredAuthentications
181 .It PubkeyAuthentication
182 .It RhostsRSAAuthentication
183 .It RSAAuthentication
185 .It ServerAliveInterval
186 .It ServerAliveCountMax
188 .It StrictHostKeyChecking
190 .It UsePrivilegedPort
192 .It UserKnownHostsFile
195 .It Fl P Ar sftp_server_path
196 Connect directly to a local sftp server
199 This option may be useful in debugging the client and server.
200 .It Fl R Ar num_requests
201 Specify how many requests may be outstanding at any one time.
202 Increasing this may slightly improve file transfer speed
203 but will increase memory usage.
204 The default is 16 outstanding requests.
208 to use for the encrypted connection.
209 The program must understand
212 .It Fl s Ar subsystem | sftp_server
213 Specifies the SSH2 subsystem or the path for an sftp server
215 A path is useful for using
217 over protocol version 1, or when the remote
219 does not have an sftp subsystem configured.
222 This option is also passed to ssh.
224 .Sh INTERACTIVE COMMANDS
225 Once in interactive mode,
227 understands a set of commands similar to those of
229 Commands are case insensitive.
230 Pathnames that contain spaces must be enclosed in quotes.
231 Any special characters contained within pathnames that are recognized by
233 must be escaped with backslashes
240 Change remote directory to
242 .It Ic chgrp Ar grp Ar path
250 characters and may match multiple files.
252 must be a numeric GID.
253 .It Ic chmod Ar mode Ar path
254 Change permissions of file
261 characters and may match multiple files.
262 .It Ic chown Ar own Ar path
270 characters and may match multiple files.
272 must be a numeric UID.
283 and store it on the local machine.
285 path name is not specified, it is given the same name it has on the
290 characters and may match multiple files.
295 must specify a directory.
298 flag is specified, then full file permissions and access times are
303 Change local directory to
305 .It Ic lls Op Ar ls-options Op Ar path
306 Display local directory listing of either
308 or current directory if
312 may contain any flags supported by the local system's
318 characters and may match multiple files.
319 .It Ic lmkdir Ar path
320 Create local directory specified by
322 .It Ic ln Ar oldpath Ar newpath
323 Create a symbolic link from
328 Print local working directory.
333 Display a remote directory listing of either
335 or the current directory if
341 characters and may match multiple files.
343 The following flags are recognized and alter the behaviour of
348 Produce single columnar output.
350 List files beginning with a dot
353 Do not sort the listing.
354 The default sort order is lexicographical.
356 Display additional details including permissions
357 and ownership information.
359 Produce a long listing with user and group information presented
362 Reverse the sort order of the listing.
364 Sort the listing by file size.
366 Sort the listing by last modification time.
368 .It Ic lumask Ar umask
372 Create remote directory specified by
375 Toggle display of progress meter.
383 and store it on the remote machine.
384 If the remote path name is not specified, it is given the same name it has
385 on the local machine.
389 characters and may match multiple files.
394 must specify a directory.
397 flag is specified, then the file's full permission and access time are
400 Display remote working directory.
404 .It Ic rename Ar oldpath Ar newpath
405 Rename remote file from
410 Delete remote file specified by
413 Remove remote directory specified by
415 .It Ic symlink Ar oldpath Ar newpath
416 Create a symbolic link from
424 .It Ic \&! Ar command
429 Escape to local shell.
447 .%T "SSH File Transfer Protocol"
448 .%N draft-ietf-secsh-filexfer-00.txt
450 .%O work in progress material