2013-10-15 01:07:05 +00:00
|
|
|
.\" $OpenBSD: sftp-server.8,v 1.25 2013/10/14 14:18:56 jmc Exp $
|
2000-09-16 02:29:08 +00:00
|
|
|
.\"
|
2001-03-05 06:59:27 +00:00
|
|
|
.\" Copyright (c) 2000 Markus Friedl. All rights reserved.
|
2000-09-16 02:29:08 +00:00
|
|
|
.\"
|
|
|
|
.\" Redistribution and use in source and binary forms, with or without
|
|
|
|
.\" modification, are permitted provided that the following conditions
|
|
|
|
.\" are met:
|
|
|
|
.\" 1. Redistributions of source code must retain the above copyright
|
|
|
|
.\" notice, this list of conditions and the following disclaimer.
|
|
|
|
.\" 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
.\" notice, this list of conditions and the following disclaimer in the
|
|
|
|
.\" documentation and/or other materials provided with the distribution.
|
|
|
|
.\"
|
|
|
|
.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
|
|
|
|
.\" IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
|
|
|
|
.\" OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
|
|
|
|
.\" IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
|
|
|
|
.\" INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
|
|
|
|
.\" NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
|
|
.\" DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
|
|
|
|
.\" THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
|
|
|
|
.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
|
|
|
|
.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
|
|
.\"
|
2013-10-15 01:07:05 +00:00
|
|
|
.Dd $Mdocdate: October 14 2013 $
|
2000-09-05 02:34:53 +00:00
|
|
|
.Dt SFTP-SERVER 8
|
|
|
|
.Os
|
|
|
|
.Sh NAME
|
|
|
|
.Nm sftp-server
|
|
|
|
.Nd SFTP server subsystem
|
|
|
|
.Sh SYNOPSIS
|
|
|
|
.Nm sftp-server
|
2013-10-15 00:55:57 +00:00
|
|
|
.Bk -words
|
2010-01-09 11:24:33 +00:00
|
|
|
.Op Fl ehR
|
2013-01-09 04:57:36 +00:00
|
|
|
.Op Fl d Ar start_directory
|
2006-07-10 10:46:55 +00:00
|
|
|
.Op Fl f Ar log_facility
|
|
|
|
.Op Fl l Ar log_level
|
2013-10-15 01:07:05 +00:00
|
|
|
.Op Fl P Ar blacklisted_requests
|
|
|
|
.Op Fl p Ar whitelisted_requests
|
2009-10-06 21:46:21 +00:00
|
|
|
.Op Fl u Ar umask
|
2013-10-15 00:55:57 +00:00
|
|
|
.Ek
|
|
|
|
.Nm
|
|
|
|
.Fl Q Ar protocol_feature
|
2000-09-05 02:34:53 +00:00
|
|
|
.Sh DESCRIPTION
|
|
|
|
.Nm
|
|
|
|
is a program that speaks the server side of SFTP protocol
|
|
|
|
to stdout and expects client requests from stdin.
|
|
|
|
.Nm
|
|
|
|
is not intended to be called directly, but from
|
2000-10-16 01:14:42 +00:00
|
|
|
.Xr sshd 8
|
2000-09-05 02:34:53 +00:00
|
|
|
using the
|
|
|
|
.Cm Subsystem
|
|
|
|
option.
|
2006-07-10 10:46:55 +00:00
|
|
|
.Pp
|
|
|
|
Command-line flags to
|
|
|
|
.Nm
|
|
|
|
should be specified in the
|
|
|
|
.Cm Subsystem
|
|
|
|
declaration.
|
2000-09-05 02:34:53 +00:00
|
|
|
See
|
2003-10-15 05:50:42 +00:00
|
|
|
.Xr sshd_config 5
|
2000-09-05 02:34:53 +00:00
|
|
|
for more information.
|
2006-07-10 10:46:55 +00:00
|
|
|
.Pp
|
|
|
|
Valid options are:
|
|
|
|
.Bl -tag -width Ds
|
2013-01-09 04:58:21 +00:00
|
|
|
.It Fl d Ar start_directory
|
2013-01-09 04:57:36 +00:00
|
|
|
specifies an alternate starting directory for users.
|
|
|
|
The pathname may contain the following tokens that are expanded at runtime:
|
|
|
|
%% is replaced by a literal '%',
|
|
|
|
%h is replaced by the home directory of the user being authenticated,
|
|
|
|
and %u is replaced by the username of that user.
|
|
|
|
The default is to use the user's home directory.
|
|
|
|
This option is useful in conjunction with the
|
|
|
|
.Xr sshd_config 5
|
|
|
|
.Cm ChrootDirectory
|
|
|
|
option.
|
2009-10-06 21:47:47 +00:00
|
|
|
.It Fl e
|
|
|
|
Causes
|
|
|
|
.Nm
|
|
|
|
to print logging information to stderr instead of syslog for debugging.
|
2006-07-10 10:46:55 +00:00
|
|
|
.It Fl f Ar log_facility
|
|
|
|
Specifies the facility code that is used when logging messages from
|
|
|
|
.Nm .
|
|
|
|
The possible values are: DAEMON, USER, AUTH, LOCAL0, LOCAL1, LOCAL2,
|
|
|
|
LOCAL3, LOCAL4, LOCAL5, LOCAL6, LOCAL7.
|
|
|
|
The default is AUTH.
|
2009-10-06 21:47:47 +00:00
|
|
|
.It Fl h
|
|
|
|
Displays
|
|
|
|
.Nm
|
|
|
|
usage information.
|
2006-07-10 10:46:55 +00:00
|
|
|
.It Fl l Ar log_level
|
|
|
|
Specifies which messages will be logged by
|
|
|
|
.Nm .
|
|
|
|
The possible values are:
|
|
|
|
QUIET, FATAL, ERROR, INFO, VERBOSE, DEBUG, DEBUG1, DEBUG2, and DEBUG3.
|
|
|
|
INFO and VERBOSE log transactions that
|
|
|
|
.Nm
|
|
|
|
performs on behalf of the client.
|
|
|
|
DEBUG and DEBUG1 are equivalent.
|
|
|
|
DEBUG2 and DEBUG3 each specify higher levels of debugging output.
|
|
|
|
The default is ERROR.
|
2013-10-15 00:55:57 +00:00
|
|
|
.It Fl P Ar blacklisted_requests
|
2013-10-15 01:07:05 +00:00
|
|
|
Specify a comma-separated list of SFTP protocol requests that are banned by
|
2013-10-15 00:55:57 +00:00
|
|
|
the server.
|
|
|
|
.Nm
|
|
|
|
will reply to any blacklisted request with a failure.
|
|
|
|
The
|
|
|
|
.Fl Q
|
2013-10-15 01:07:05 +00:00
|
|
|
flag can be used to determine the supported request types.
|
2013-10-15 00:55:57 +00:00
|
|
|
If both a blacklist and a whitelist are specified, then the blacklist is
|
|
|
|
applied before the whitelist.
|
|
|
|
.It Fl p Ar whitelisted_requests
|
2013-10-15 01:07:05 +00:00
|
|
|
Specify a comma-separated list of SFTP protocol requests that are permitted
|
2013-10-15 00:55:57 +00:00
|
|
|
by the server.
|
|
|
|
All request types that are not on the whitelist will be logged and replied
|
|
|
|
to with a failure message.
|
|
|
|
.Pp
|
|
|
|
Care must be taken when using this feature to ensure that requests made
|
2013-10-15 01:07:05 +00:00
|
|
|
implicitly by SFTP clients are permitted.
|
2013-10-15 00:55:57 +00:00
|
|
|
.It Fl Q Ar protocol_feature
|
|
|
|
Query protocol features supported by
|
|
|
|
.Nm .
|
|
|
|
At present the only feature that may be queried is
|
|
|
|
.Dq requests ,
|
2013-10-15 01:07:05 +00:00
|
|
|
which may be used for black or whitelisting (flags
|
2013-10-15 00:55:57 +00:00
|
|
|
.Fl P
|
2013-10-15 01:07:05 +00:00
|
|
|
and
|
|
|
|
.Fl p
|
|
|
|
respectively).
|
2010-01-09 11:24:33 +00:00
|
|
|
.It Fl R
|
|
|
|
Places this instance of
|
|
|
|
.Nm
|
|
|
|
into a read-only mode.
|
|
|
|
Attempts to open files for writing, as well as other operations that change
|
2010-01-09 11:25:46 +00:00
|
|
|
the state of the filesystem, will be denied.
|
2009-10-06 21:46:21 +00:00
|
|
|
.It Fl u Ar umask
|
|
|
|
Sets an explicit
|
|
|
|
.Xr umask 2
|
|
|
|
to be applied to newly-created files and directories, instead of the
|
|
|
|
user's default mask.
|
2006-07-10 10:46:55 +00:00
|
|
|
.El
|
2008-07-14 02:09:57 +00:00
|
|
|
.Pp
|
|
|
|
For logging to work,
|
|
|
|
.Nm
|
|
|
|
must be able to access
|
|
|
|
.Pa /dev/log .
|
|
|
|
Use of
|
|
|
|
.Nm
|
2009-06-21 07:52:27 +00:00
|
|
|
in a chroot configuration therefore requires that
|
2008-07-14 02:09:57 +00:00
|
|
|
.Xr syslogd 8
|
|
|
|
establish a logging socket inside the chroot directory.
|
2000-09-05 02:34:53 +00:00
|
|
|
.Sh SEE ALSO
|
2001-04-22 17:17:46 +00:00
|
|
|
.Xr sftp 1 ,
|
2000-09-05 02:34:53 +00:00
|
|
|
.Xr ssh 1 ,
|
2003-10-15 05:50:42 +00:00
|
|
|
.Xr sshd_config 5 ,
|
2000-10-16 01:14:42 +00:00
|
|
|
.Xr sshd 8
|
2001-04-22 17:17:46 +00:00
|
|
|
.Rs
|
2001-06-25 04:45:33 +00:00
|
|
|
.%A T. Ylonen
|
|
|
|
.%A S. Lehtinen
|
2001-04-22 17:17:46 +00:00
|
|
|
.%T "SSH File Transfer Protocol"
|
2013-05-16 10:24:23 +00:00
|
|
|
.%N draft-ietf-secsh-filexfer-02.txt
|
|
|
|
.%D October 2001
|
2001-04-22 17:17:46 +00:00
|
|
|
.%O work in progress material
|
|
|
|
.Re
|
2000-10-16 01:14:42 +00:00
|
|
|
.Sh HISTORY
|
|
|
|
.Nm
|
2006-09-26 10:14:28 +00:00
|
|
|
first appeared in
|
|
|
|
.Ox 2.8 .
|
|
|
|
.Sh AUTHORS
|
2013-07-18 06:14:13 +00:00
|
|
|
.An Markus Friedl Aq Mt markus@openbsd.org
|