blob: c117398e8583de6efd8b833660d929da6bc71108 [file] [log] [blame]
Adam Langleyd0592972015-03-30 14:49:51 -07001.\" $OpenBSD: sftp-server.8,v 1.27 2014/12/11 04:16:14 djm Exp $
Greg Hartmanbd77cf72015-02-25 13:21:06 -08002.\"
3.\" Copyright (c) 2000 Markus Friedl. All rights reserved.
4.\"
5.\" Redistribution and use in source and binary forms, with or without
6.\" modification, are permitted provided that the following conditions
7.\" are met:
8.\" 1. Redistributions of source code must retain the above copyright
9.\" notice, this list of conditions and the following disclaimer.
10.\" 2. Redistributions in binary form must reproduce the above copyright
11.\" notice, this list of conditions and the following disclaimer in the
12.\" documentation and/or other materials provided with the distribution.
13.\"
14.\" THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR
15.\" IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES
16.\" OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
17.\" IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT,
18.\" INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
19.\" NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
20.\" DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
21.\" THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
22.\" (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF
23.\" THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
24.\"
Adam Langleyd0592972015-03-30 14:49:51 -070025.Dd $Mdocdate: December 11 2014 $
Greg Hartmanbd77cf72015-02-25 13:21:06 -080026.Dt SFTP-SERVER 8
27.Os
28.Sh NAME
29.Nm sftp-server
30.Nd SFTP server subsystem
31.Sh SYNOPSIS
32.Nm sftp-server
Adam Langleyd0592972015-03-30 14:49:51 -070033.Bk -words
Greg Hartmanbd77cf72015-02-25 13:21:06 -080034.Op Fl ehR
Adam Langleyd0592972015-03-30 14:49:51 -070035.Op Fl d Ar start_directory
Greg Hartmanbd77cf72015-02-25 13:21:06 -080036.Op Fl f Ar log_facility
37.Op Fl l Ar log_level
Adam Langleyd0592972015-03-30 14:49:51 -070038.Op Fl P Ar blacklisted_requests
39.Op Fl p Ar whitelisted_requests
Greg Hartmanbd77cf72015-02-25 13:21:06 -080040.Op Fl u Ar umask
Adam Langleyd0592972015-03-30 14:49:51 -070041.Ek
42.Nm
43.Fl Q Ar protocol_feature
Greg Hartmanbd77cf72015-02-25 13:21:06 -080044.Sh DESCRIPTION
45.Nm
46is a program that speaks the server side of SFTP protocol
47to stdout and expects client requests from stdin.
48.Nm
49is not intended to be called directly, but from
50.Xr sshd 8
51using the
52.Cm Subsystem
53option.
54.Pp
55Command-line flags to
56.Nm
57should be specified in the
58.Cm Subsystem
59declaration.
60See
61.Xr sshd_config 5
62for more information.
63.Pp
64Valid options are:
65.Bl -tag -width Ds
Adam Langleyd0592972015-03-30 14:49:51 -070066.It Fl d Ar start_directory
67specifies an alternate starting directory for users.
68The pathname may contain the following tokens that are expanded at runtime:
69%% is replaced by a literal '%',
70%d is replaced by the home directory of the user being authenticated,
71and %u is replaced by the username of that user.
72The default is to use the user's home directory.
73This option is useful in conjunction with the
74.Xr sshd_config 5
75.Cm ChrootDirectory
76option.
Greg Hartmanbd77cf72015-02-25 13:21:06 -080077.It Fl e
78Causes
79.Nm
80to print logging information to stderr instead of syslog for debugging.
81.It Fl f Ar log_facility
82Specifies the facility code that is used when logging messages from
83.Nm .
84The possible values are: DAEMON, USER, AUTH, LOCAL0, LOCAL1, LOCAL2,
85LOCAL3, LOCAL4, LOCAL5, LOCAL6, LOCAL7.
86The default is AUTH.
87.It Fl h
88Displays
89.Nm
90usage information.
91.It Fl l Ar log_level
92Specifies which messages will be logged by
93.Nm .
94The possible values are:
95QUIET, FATAL, ERROR, INFO, VERBOSE, DEBUG, DEBUG1, DEBUG2, and DEBUG3.
96INFO and VERBOSE log transactions that
97.Nm
98performs on behalf of the client.
99DEBUG and DEBUG1 are equivalent.
100DEBUG2 and DEBUG3 each specify higher levels of debugging output.
101The default is ERROR.
Adam Langleyd0592972015-03-30 14:49:51 -0700102.It Fl P Ar blacklisted_requests
103Specify a comma-separated list of SFTP protocol requests that are banned by
104the server.
105.Nm
106will reply to any blacklisted request with a failure.
107The
108.Fl Q
109flag can be used to determine the supported request types.
110If both a blacklist and a whitelist are specified, then the blacklist is
111applied before the whitelist.
112.It Fl p Ar whitelisted_requests
113Specify a comma-separated list of SFTP protocol requests that are permitted
114by the server.
115All request types that are not on the whitelist will be logged and replied
116to with a failure message.
117.Pp
118Care must be taken when using this feature to ensure that requests made
119implicitly by SFTP clients are permitted.
120.It Fl Q Ar protocol_feature
121Query protocol features supported by
122.Nm .
123At present the only feature that may be queried is
124.Dq requests ,
125which may be used for black or whitelisting (flags
126.Fl P
127and
128.Fl p
129respectively).
Greg Hartmanbd77cf72015-02-25 13:21:06 -0800130.It Fl R
131Places this instance of
132.Nm
133into a read-only mode.
134Attempts to open files for writing, as well as other operations that change
135the state of the filesystem, will be denied.
136.It Fl u Ar umask
137Sets an explicit
138.Xr umask 2
139to be applied to newly-created files and directories, instead of the
140user's default mask.
141.El
142.Pp
Adam Langleyd0592972015-03-30 14:49:51 -0700143On some systems,
Greg Hartmanbd77cf72015-02-25 13:21:06 -0800144.Nm
145must be able to access
Adam Langleyd0592972015-03-30 14:49:51 -0700146.Pa /dev/log
147for logging to work, and use of
Greg Hartmanbd77cf72015-02-25 13:21:06 -0800148.Nm
149in a chroot configuration therefore requires that
150.Xr syslogd 8
151establish a logging socket inside the chroot directory.
152.Sh SEE ALSO
153.Xr sftp 1 ,
154.Xr ssh 1 ,
155.Xr sshd_config 5 ,
156.Xr sshd 8
157.Rs
158.%A T. Ylonen
159.%A S. Lehtinen
160.%T "SSH File Transfer Protocol"
Adam Langleyd0592972015-03-30 14:49:51 -0700161.%N draft-ietf-secsh-filexfer-02.txt
162.%D October 2001
Greg Hartmanbd77cf72015-02-25 13:21:06 -0800163.%O work in progress material
164.Re
165.Sh HISTORY
166.Nm
167first appeared in
168.Ox 2.8 .
169.Sh AUTHORS
Adam Langleyd0592972015-03-30 14:49:51 -0700170.An Markus Friedl Aq Mt markus@openbsd.org