[root@docker /]# rclone config
Current remotes:Name Type
==== ====
demo sftp
demo1 sftp
sync sftpe) Edit existing remote
n) New remote
d) Delete remote
r) Rename remote
c) Copy remote
s) Set configuration password
q) Quit config
e/n/d/r/c/s/q> nEnter name for new remote.
name> 247Option Storage.
Type of storage to configure.
Choose a number from below, or type in your own value.1 / 1Fichier\ (fichier)2 / Akamai NetStorage\ (netstorage)3 / Alias for an existing remote\ (alias)4 / Amazon S3 Compliant Storage Providers including AWS, Alibaba, ArvanCloud, Ceph, ChinaMobile, Cloudflare, DigitalOcean, Dreamhost, Exaba, FlashBlade, GCS, HuaweiOBS, IBMCOS, IDrive, IONOS, LyveCloud, Leviia, Liara, Linode, Magalu, Mega, Minio, Netease, Outscale, OVHcloud, Petabox, RackCorp, Rclone, Scaleway, SeaweedFS, Selectel, StackPath, Storj, Synology, TencentCOS, Wasabi, Qiniu, Zata and others\ (s3)5 / Backblaze B2\ (b2)6 / Better checksums for other remotes\ (hasher)7 / Box\ (box)8 / Cache a remote\ (cache)9 / Citrix Sharefile\ (sharefile)
10 / Cloudinary\ (cloudinary)
11 / Combine several remotes into one\ (combine)
12 / Compress a remote\ (compress)
13 / DOI datasets\ (doi)
14 / Dropbox\ (dropbox)
15 / Encrypt/Decrypt a remote\ (crypt)
16 / Enterprise File Fabric\ (filefabric)
17 / FTP\ (ftp)
18 / FileLu Cloud Storage\ (filelu)
19 / Files.com\ (filescom)
20 / Gofile\ (gofile)
21 / Google Cloud Storage (this is not Google Drive)\ (google cloud storage)
22 / Google Drive\ (drive)
23 / Google Photos\ (google photos)
24 / HTTP\ (http)
25 / Hadoop distributed file system\ (hdfs)
26 / HiDrive\ (hidrive)
27 / ImageKit.io\ (imagekit)
28 / In memory object storage system.\ (memory)
29 / Internet Archive\ (internetarchive)
30 / Jottacloud\ (jottacloud)
31 / Koofr, Digi Storage and other Koofr-compatible storage providers\ (koofr)
32 / Linkbox\ (linkbox)
33 / Local Disk\ (local)
34 / Mail.ru Cloud\ (mailru)
35 / Mega\ (mega)
36 / Microsoft Azure Blob Storage\ (azureblob)
37 / Microsoft Azure Files\ (azurefiles)
38 / Microsoft OneDrive\ (onedrive)
39 / OpenDrive\ (opendrive)
40 / OpenStack Swift (Rackspace Cloud Files, Blomp Cloud Storage, Memset Memstore, OVH)\ (swift)
41 / Oracle Cloud Infrastructure Object Storage\ (oracleobjectstorage)
42 / Pcloud\ (pcloud)
43 / PikPak\ (pikpak)
44 / Pixeldrain Filesystem\ (pixeldrain)
45 / Proton Drive\ (protondrive)
46 / Put.io\ (putio)
47 / QingCloud Object Storage\ (qingstor)
48 / Quatrix by Maytech\ (quatrix)
49 / SMB / CIFS\ (smb)
50 / SSH/SFTP\ (sftp)
51 / Sia Decentralized Cloud\ (sia)
52 / Storj Decentralized Cloud Storage\ (storj)
53 / Sugarsync\ (sugarsync)
54 / Transparently chunk/split large files\ (chunker)
55 / Uloz.to\ (ulozto)
56 / Union merges the contents of several upstream fs\ (union)
57 / Uptobox\ (uptobox)
58 / WebDAV\ (webdav)
59 / Yandex Disk\ (yandex)
60 / Zoho\ (zoho)
61 / iCloud Drive\ (iclouddrive)
62 / premiumize.me\ (premiumizeme)
63 / seafile\ (seafile)
Storage> 50Option host.
SSH host to connect to.
E.g. "example.com".
Enter a value.
host> 192.168.102.247Option user.
SSH username.
Enter a value of type string. Press Enter for the default (root).
user> Option port.
SSH port number.
Enter a signed integer. Press Enter for the default (22).
port> Option pass.
SSH password, leave blank to use ssh-agent.
Choose an alternative below. Press Enter for the default (n).
y) Yes, type in my own password
g) Generate random password
n) No, leave this optional password blank (default)
y/g/n> nOption key_pem.
Raw PEM-encoded private key.
Note that this should be on a single line with line endings replaced with '\n', egkey_pem = -----BEGIN RSA PRIVATE KEY-----\nMaMbaIXtE\n0gAMbMbaSsd\nMbaass\n-----END RSA PRIVATE KEY-----
This will generate the single line correctly:awk '{printf "%s\\n", $0}' < ~/.ssh/id_rsa
If specified, it will override the key_file parameter.
Enter a value. Press Enter to leave empty.
key_pem> Option key_file.
Path to PEM-encoded private key file.
Leave blank or set key-use-agent to use ssh-agent.
Leading `~` will be expanded in the file name as will environment variables such as `${RCLONE_CONFIG_DIR}`.
Enter a value. Press Enter to leave empty.
key_file> ~/.ssh/rclone_sync_keyOption key_file_pass.
The passphrase to decrypt the PEM-encoded private key file.
Only PEM encrypted key files (old OpenSSH format) are supported. Encrypted keys
in the new OpenSSH format can't be used.
Choose an alternative below. Press Enter for the default (n).
y) Yes, type in my own password
g) Generate random password
n) No, leave this optional password blank (default)
y/g/n> Option pubkey.
SSH public certificate for public certificate based authentication.
Set this if you have a signed certificate you want to use for authentication.
If specified will override pubkey_file.
Enter a value. Press Enter to leave empty.
pubkey> Option pubkey_file.
Optional path to public key file.
Set this if you have a signed certificate you want to use for authentication.
Leading `~` will be expanded in the file name as will environment variables such as `${RCLONE_CONFIG_DIR}`.
Enter a value. Press Enter to leave empty.
pubkey_file> Option key_use_agent.
When set forces the usage of the ssh-agent.
When key-file is also set, the ".pub" file of the specified key-file is read and only the associated key is
requested from the ssh-agent. This allows to avoid `Too many authentication failures for *username*` errors
when the ssh-agent contains many keys.
Enter a boolean value (true or false). Press Enter for the default (false).
key_use_agent> Option use_insecure_cipher.
Enable the use of insecure ciphers and key exchange methods.
This enables the use of the following insecure ciphers and key exchange methods:
- aes128-cbc
- aes192-cbc
- aes256-cbc
- 3des-cbc
- diffie-hellman-group-exchange-sha256
- diffie-hellman-group-exchange-sha1
Those algorithms are insecure and may allow plaintext data to be recovered by an attacker.
This must be false if you use either ciphers or key_exchange advanced options.
Choose a number from below, or type in your own boolean value (true or false).
Press Enter for the default (false).1 / Use default Cipher list.\ (false)2 / Enables the use of the aes128-cbc cipher and diffie-hellman-group-exchange-sha256, diffie-hellman-group-exchange-sha1 key exchange.\ (true)
use_insecure_cipher> Option disable_hashcheck.
Disable the execution of SSH commands to determine if remote file hashing is available.
Leave blank or set to false to enable hashing (recommended), set to true to disable hashing.
Enter a boolean value (true or false). Press Enter for the default (false).
disable_hashcheck> Option ssh.
Path and arguments to external ssh binary.
Normally rclone will use its internal ssh library to connect to the
SFTP server. However it does not implement all possible ssh options so
it may be desirable to use an external ssh binary.
Rclone ignores all the internal config if you use this option and
expects you to configure the ssh binary with the user/host/port and
any other options you need.
**Important** The ssh command must log in without asking for a
password so needs to be configured with keys or certificates.
Rclone will run the command supplied either with the additional
arguments "-s sftp" to access the SFTP subsystem or with commands such
as "md5sum /path/to/file" appended to read checksums.
Any arguments with spaces in should be surrounded by "double quotes".
An example setting might be:ssh -o ServerAliveInterval=20 user@example.com
Note that when using an external ssh binary rclone makes a new ssh
connection for every hash it calculates.
Enter a value of type SpaceSepList. Press Enter to leave empty.
ssh> Edit advanced config?
y) Yes
n) No (default)
y/n> Configuration complete.
Options:
- type: sftp
- host: 192.168.102.247
- key_file: ~/.ssh/rclone_sync_key
Keep this "247" remote?
y) Yes this is OK (default)
e) Edit this remote
d) Delete this remote
y/e/d>