1 .\" $OpenBSD: sftp.1,v 1.64 2007/05/31 19:20:16 jmc Exp $
3 .\" Copyright (c) 2001 Damien Miller. All rights reserved.
5 .\" Redistribution and use in source and binary forms, with or without
6 .\" modification, are permitted provided that the following conditions
8 .\" 1. Redistributions of source code must retain the above copyright
9 .\" notice, this list of conditions and the following disclaimer.
10 .\" 2. Redistributions in binary form must reproduce the above copyright
11 .\" notice, this list of conditions and the following disclaimer in the
12 .\" documentation and/or other materials provided with the distribution.
14 .\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
15 .\" IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
16 .\" OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
17 .\" IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
18 .\" INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
19 .\" NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
20 .\" DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
21 .\" THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
22 .\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
23 .\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
25 .Dd $Mdocdate: June 5 2007 $
30 .Nd secure file transfer program
35 .Op Fl B Ar buffer_size
37 .Op Fl F Ar ssh_config
38 .Op Fl o Ar ssh_option
39 .Op Fl P Ar sftp_server_path
40 .Op Fl R Ar num_requests
42 .Op Fl s Ar subsystem | sftp_server
46 .Oo Oo Ar user Ns @ Oc Ns
47 .Ar host Ns Oo : Ns Ar file Oo
50 .Oo Oo Ar user Ns @ Oc Ns
51 .Ar host Ns Oo : Ns Ar dir Ns
55 .Oo Ar user Ns @ Oc Ns Ar host
58 is an interactive file transfer program, similar to
60 which performs all operations over an encrypted
63 It may also use many features of ssh, such as public key authentication and
66 connects and logs into the specified
68 then enters an interactive command mode.
70 The second usage format will retrieve files automatically if a non-interactive
71 authentication method is used; otherwise it will do so after
72 successful interactive authentication.
74 The third usage format allows
76 to start in a remote directory.
78 The final usage format allows for automated sessions using the
81 In such cases, it is necessary to configure non-interactive authentication
82 to obviate the need to enter a password at connection time (see
87 The options are as follows:
90 Specify the use of protocol version 1.
91 .It Fl B Ar buffer_size
92 Specify the size of the buffer that
94 uses when transferring files.
95 Larger buffers require fewer round trips at the cost of higher
97 The default is 32768 bytes.
99 Batch mode reads a series of commands from an input
103 Since it lacks user interaction it should be used in conjunction with
104 non-interactive authentication.
109 may be used to indicate standard input.
111 will abort if any of the following
113 .Ic get , put , rename , ln ,
114 .Ic rm , mkdir , chdir , ls ,
115 .Ic lchdir , chmod , chown , chgrp , lpwd
118 Termination on error can be suppressed on a command by command basis by
119 prefixing the command with a
121 character (for example,
122 .Ic -rm /tmp/blah* ) .
124 Enables compression (via ssh's
127 .It Fl F Ar ssh_config
128 Specifies an alternative
129 per-user configuration file for
131 This option is directly passed to
133 .It Fl o Ar ssh_option
134 Can be used to pass options to
136 in the format used in
138 This is useful for specifying options
139 for which there is no separate
142 For example, to specify an alternate port use:
144 For full details of the options listed below, and their possible values, see
147 .Bl -tag -width Ds -offset indent -compact
151 .It ChallengeResponseAuthentication
157 .It ConnectionAttempts
161 .It GlobalKnownHostsFile
162 .It GSSAPIAuthentication
163 .It GSSAPIDelegateCredentials
166 .It HostbasedAuthentication
167 .It HostKeyAlgorithms
172 .It KbdInteractiveDevices
175 .It NoHostAuthenticationForLocalhost
176 .It NumberOfPasswordPrompts
177 .It PasswordAuthentication
179 .It PreferredAuthentications
182 .It PubkeyAuthentication
184 .It RhostsRSAAuthentication
185 .It RSAAuthentication
187 .It ServerAliveInterval
188 .It ServerAliveCountMax
190 .It StrictHostKeyChecking
192 .It UsePrivilegedPort
194 .It UserKnownHostsFile
197 .It Fl P Ar sftp_server_path
198 Connect directly to a local sftp server
201 This option may be useful in debugging the client and server.
202 .It Fl R Ar num_requests
203 Specify how many requests may be outstanding at any one time.
204 Increasing this may slightly improve file transfer speed
205 but will increase memory usage.
206 The default is 16 outstanding requests.
210 to use for the encrypted connection.
211 The program must understand
214 .It Fl s Ar subsystem | sftp_server
215 Specifies the SSH2 subsystem or the path for an sftp server
217 A path is useful for using
219 over protocol version 1, or when the remote
221 does not have an sftp subsystem configured.
224 This option is also passed to ssh.
226 .Sh INTERACTIVE COMMANDS
227 Once in interactive mode,
229 understands a set of commands similar to those of
231 Commands are case insensitive.
232 Pathnames that contain spaces must be enclosed in quotes.
233 Any special characters contained within pathnames that are recognized by
235 must be escaped with backslashes
242 Change remote directory to
244 .It Ic chgrp Ar grp Ar path
252 characters and may match multiple files.
254 must be a numeric GID.
255 .It Ic chmod Ar mode Ar path
256 Change permissions of file
263 characters and may match multiple files.
264 .It Ic chown Ar own Ar path
272 characters and may match multiple files.
274 must be a numeric UID.
285 and store it on the local machine.
287 path name is not specified, it is given the same name it has on the
292 characters and may match multiple files.
297 must specify a directory.
300 flag is specified, then full file permissions and access times are
305 Change local directory to
307 .It Ic lls Op Ar ls-options Op Ar path
308 Display local directory listing of either
310 or current directory if
314 may contain any flags supported by the local system's
320 characters and may match multiple files.
321 .It Ic lmkdir Ar path
322 Create local directory specified by
324 .It Ic ln Ar oldpath Ar newpath
325 Create a symbolic link from
330 Print local working directory.
335 Display a remote directory listing of either
337 or the current directory if
343 characters and may match multiple files.
345 The following flags are recognized and alter the behaviour of
350 Produce single columnar output.
352 List files beginning with a dot
355 Do not sort the listing.
356 The default sort order is lexicographical.
358 Display additional details including permissions
359 and ownership information.
361 Produce a long listing with user and group information presented
364 Reverse the sort order of the listing.
366 Sort the listing by file size.
368 Sort the listing by last modification time.
370 .It Ic lumask Ar umask
374 Create remote directory specified by
377 Toggle display of progress meter.
385 and store it on the remote machine.
386 If the remote path name is not specified, it is given the same name it has
387 on the local machine.
391 characters and may match multiple files.
396 must specify a directory.
399 flag is specified, then the file's full permission and access time are
402 Display remote working directory.
406 .It Ic rename Ar oldpath Ar newpath
407 Rename remote file from
412 Delete remote file specified by
415 Remove remote directory specified by
417 .It Ic symlink Ar oldpath Ar newpath
418 Create a symbolic link from
426 .It Ic \&! Ar command
431 Escape to local shell.
449 .%T "SSH File Transfer Protocol"
450 .%N draft-ietf-secsh-filexfer-00.txt
452 .%O work in progress material