is the user interface to the Internet standard File Transfer Protocol. The program allows a user to transfer files to and from a remote network site.

The last five arguments will fetch a file using the

or

protocols, or by direct copying, into the current directory. This is ideal for scripts. Refer to

below for more information.

Options may be specified at the command line, or to the command interpreter.

Forces

to only use IPv4 addresses.

Forces

to only use IPv6 addresses.

Force active mode

By default,

will try to use passive mode

and fall back to active mode if passive is not supported by the server. This option causes

to always use an active connection. It is only useful for connecting to very old servers that do not implement passive mode properly.

Causes

to bypass normal login procedure, and use an anonymous login instead.

Enables debugging.

Disables command line editing. This is useful for Emacs ange-ftp mode.

Forces a cache reload for transfers that go through the

or

proxies.

Disables file name globbing.

Turns off interactive prompting during multiple file transfers.

Use

instead of

Refer to

for more information.

Restrains

from attempting

upon initial connection for non auto-fetch transfers. If auto-login is enabled,

will check the

(see below) file in the user's home directory for an entry describing an account on the remote machine. If no entry exists,

will prompt for the remote machine login name (default is the user identity on the local machine), and, if necessary, prompt for a password and an account with which to login. To override the auto-login for auto-fetch transfers, specify the username (and optionally, password) as appropriate.

When auto-fetching files, save the contents in

is parsed according to the

below. If

is not

or doesn't start with

then only the first file specified will be retrieved into

all other files will be retrieved into the basename of their remote name.

Sets the port number to

Enable passive mode operation for use behind connection filtering firewalls. This option has been deprecated as

now tries to use passive mode by default, falling back to active mode if the server does not support passive connections.

Quit if the connection has stalled for

seconds.

Restart all non-proxied auto-fetches.

Retry the connection attempt if it failed, pausing for

seconds.

Uses

as the local IP address for all connections.

Enables packet tracing.

Set the maximum transfer rate for

to

bytes/second, and if specified, the increment to

bytes/second. Refer to

for more information.

Upload files on the command line to

where

is one of the

URL types as supported by auto-fetch (with an optional target filename for single file uploads), and

is one or more local files to be uploaded.

Disable

and

overriding the default of enabled when output is to a terminal.

Enable

and

This is the default if output is to a terminal (and in the case of

is the foreground process). Forces

to show all responses from the remote server, as well as report on data transfer statistics.

Set the size of the socket send and receive buffers to

Refer to

for more information.

Display help to stdout, and exit.

The client host with which

is to communicate may be specified on the command line. If this is done,

will immediately attempt to establish a connection to an

server on that host; otherwise,

will enter its command interpreter and await instructions from the user. When

is awaiting commands from the user the prompt

is provided to the user. The following commands are recognized by

Invoke an interactive shell on the local machine. If there are arguments, the first is taken to be a command to execute directly, with the rest of the arguments as its arguments.

Execute the macro

that was defined with the

command. Arguments are passed to the macro unglobbed.

Supply a supplemental password required by a remote system for access to resources once a login has been successfully completed. If no argument is included, the user will be prompted for an account password in a non-echoing input mode.

Append a local file to a file on the remote machine. If

is left unspecified, the local file name is used in naming the remote file after being altered by any

or

setting. File transfer uses the current settings for

and

Set the file transfer

to network

This is the default type.

Arrange that a bell be sounded after each file transfer command is completed.

Set the file transfer

to support binary image transfer.

Terminate the

session with the remote server and exit

An end of file will also terminate the session and exit.

Toggle remote computer file name case mapping during

and

commands. When

is on (default is off), remote computer file names with all letters in upper case are written in the local directory with the letters mapped to lower case.

Change the working directory on the remote machine to

Change the remote machine working directory to the parent of the current remote machine working directory.

Change the permission modes of the file

on the remote system to

Terminate the

session with the remote server, and return to the command interpreter. Any defined macros are erased.

Toggle carriage return stripping during ascii type file retrieval. Records are denoted by a carriage return/linefeed sequence during ascii type file transfer. When

is on (the default), carriage returns are stripped from this sequence to conform with the

single linefeed record delimiter. Records on

remote systems may contain single linefeeds; when an ascii type transfer is made, these linefeeds may be distinguished from a record delimiter only when

is off.

Toggle debugging mode. If an optional

is specified it is used to set the debugging level. When debugging is on,

prints each command sent to the remote machine, preceded by the string

Delete the file

on the remote machine.

Print a listing of the contents of a directory on the remote machine. The listing includes any system-dependent information that the server chooses to include; for example, most

systems will produce output from the command

If

is left unspecified, the current working directory is used. If interactive prompting is on,

will prompt the user to verify that the last argument is indeed the target local file for receiving

output. If no local file is specified, or if

is

the output is sent to the terminal.

A synonym for

Toggle command line editing, and context sensitive command and file completion. This is automatically enabled if input is from a terminal, and disabled otherwise.

Toggle the use of the extended

and

commands on all IP, IPv4, and IPv6 connections respectively. First try

and then

This is enabled by default. If an extended command fails then this option will be temporarily disabled for the duration of the current connection, or until

or

is executed again.

A synonym for

Display what features the remote server supports (using the

command).

Retrieve the files listed in

which has one line per filename.

Set the file transfer

to

The default (and only supported) format is

A synonym for

Toggle gate-ftp mode, which used to connect through the TIS FWTK and Gauntlet

proxies. This will not be permitted if the gate-ftp server hasn't been set (either explicitly by the user, or from the

environment variable). If

is given, then gate-ftp mode will be enabled, and the gate-ftp server will be set to

If

is also given, that will be used as the port to connect to on the gate-ftp server.

Retrieve the

and store it on the local machine. If the local file name is not specified, it is given the same name it has on the remote machine, subject to alteration by the current

and

settings. The current settings for

and

are used while transferring the file.

Toggle filename expansion for

and

If globbing is turned off with

the file name arguments are taken literally and not expanded. Globbing for

is done as in

For

and

each remote file name is expanded separately on the remote machine and the lists are not merged. Expansion of a directory name is likely to be different from expansion of the name of an ordinary file: the exact result depends on the foreign operating system and

server, and can be previewed by doing

Note:

and

are not meant to transfer entire directory subtrees of files. That can be done by transferring a

archive of the subtree (in binary mode).

Toggle hash-sign

printing for each data block transferred. The size of a data block defaults to 1024 bytes. This can be changed by specifying

in bytes. Enabling

disables

Print an informative message about the meaning of

If no argument is given,

prints a list of the known commands.

Set the inactivity timer on the remote server to

seconds. If

is omitted, the current inactivity timer is printed.

A synonym for

Change the working directory on the local machine. If no

is specified, the user's home directory is used.

A synonym for

Display

with the program specified by the

option.

Print the working directory on the local machine.

A synonym for

Define a macro. Subsequent lines are stored as the macro

a null line (consecutive newline characters in a file or carriage returns from the terminal) terminates macro input mode. There is a limit of 16 macros and 4096 total characters in all defined macros. Macro names can be a maximum of 8 characters. Macros are only applicable to the current session they are defined within (or if defined outside a session, to the session invoked with the next

command), and remain defined until a

command is executed. To invoke a macro, use the

command (see above).

The macro processor interprets

and

as special characters. A

followed by a number (or numbers) is replaced by the corresponding argument on the macro invocation command line. A

followed by an

signals the macro processor that the executing macro is to be looped. On the first pass

is replaced by the first argument on the macro invocation command line, on the second pass it is replaced by the second argument, and so on. A

followed by any character is replaced by that character. Use the

to prevent special treatment of the

Delete the

on the remote machine.

Like

except multiple remote files may be specified. If interactive prompting is on,

will prompt the user to verify that the last argument is indeed the target local file for receiving

output.

Expand the

on the remote machine and do a

for each file name thus produced. See

for details on the filename expansion. Resulting file names will then be processed according to

and

settings. Files are transferred into the local working directory, which can be changed with

new local directories can be created with

Make a directory on the remote machine.

Like

except multiple remote files may be specified, and the

must be specified. If interactive prompting is on,

will prompt the user to verify that the last argument is indeed the target local file for receiving

output.

Display the contents of

(which should default to the current directory if not given) in a machine-parsable form, using

The format of display can be changed with

Display the details about

(which should default to the current directory if not given) in a machine-parsable form, using

The format of display can be changed with

Set the file transfer

to

The default (and only supported) mode is

Show the last modification time of the file on the remote machine, in

format.

A synonym for

Expand wild cards in the list of local files given as arguments and do a

for each file in the resulting list. See

for details of filename expansion. Resulting file names will then be processed according to

and

settings.

As per

but performs a

instead of

A synonym for

Get the file only if the modification time of the remote file is more recent that the file on the current system. If the file does not exist on the current system, the remote file is considered

Otherwise, this command is identical to

A synonym for

Set or unset the filename mapping mechanism. If no arguments are specified, the filename mapping mechanism is unset. If arguments are specified, remote filenames are mapped during

commands and

commands issued without a specified remote target filename. If arguments are specified, local filenames are mapped during

commands and

commands issued without a specified local target filename. This command is useful when connecting to a

remote computer with different file naming conventions or practices. The mapping follows the pattern set by

and

is a template for incoming filenames (which may have already been processed according to the

and

settings). Variable templating is accomplished by including the sequences

...,

in

Use

to prevent this special treatment of the

character. All other characters are treated literally, and are used to determine the

variable values. For example, given

and the remote file name

would have the value

and

would have the value

The

determines the resulting mapped filename. The sequences

...,

are replaced by any value resulting from the

template. The sequence

is replaced by the original filename. Additionally, the sequence

is replaced by

if

is not a null string; otherwise it is replaced by

For example, the command

would yield the output filename

for input filenames

and

for the input filename

and

for the input filename

Spaces may be included in

as in the example:

Use the

character to prevent special treatment of the

and

characters.

Set or unset the filename character translation mechanism. If no arguments are specified, the filename character translation mechanism is unset. If arguments are specified, characters in remote filenames are translated during

commands and

commands issued without a specified remote target filename. If arguments are specified, characters in local filenames are translated during

commands and

commands issued without a specified local target filename. This command is useful when connecting to a

remote computer with different file naming conventions or practices. Characters in a filename matching a character in

are replaced with the corresponding character in

If the character's position in

is longer than the length of

the character is deleted from the file name.

Establish a connection to the specified

server. An optional port number may be supplied, in which case,

will attempt to contact an

server at that port. If the

option is on (default),

will also attempt to automatically log the user in to the

server (see below).

Retrieve

and display with the program specified by the

option.

Toggle passive mode (if no arguments are given). If

is given, act as if

is set to

If passive mode is turned on (default),

will send a

command for all data connections instead of a

command. The

command requests that the remote server open a port for the data connection and return the address of that port. The remote server listens on that port and the client connects to it. When using the more traditional

command, the client listens on a port and sends that address to the remote server, who connects back to it. Passive mode is useful when using

through a gateway router or host that controls the directionality of traffic. (Note that though

servers are required to support the

command by

some do not.)

Perform

and display the result with the program specified by the

option.

Perform

and display the result with the program specified by the

option.

Perform

and display the result with the program specified by the

option.

Toggle preservation of modification times on retrieved files.

Toggle display of transfer progress bar. The progress bar will be disabled for a transfer that has

as

or a command that starts with

Refer to

for more information. Enabling

disables

Toggle interactive prompting. Interactive prompting occurs during multiple file transfers to allow the user to selectively retrieve or store files. If prompting is turned off (default is on), any

or

will transfer all files, and any

will delete all files.

When prompting is on, the following commands are available at a prompt:

Answer

to the current file, and automatically answer

to any remaining files for the current command.

Answer

and do not transfer the file.

Answer

to the current file, and turn off prompt mode (as is

had been given).

Terminate the current operation.

Answer

and transfer the file.

Display a help message.

Any other response will answer

to the current file.

Execute an

command on a secondary control connection. This command allows simultaneous connection to two remote

servers for transferring files between the two servers. The first

command should be an

to establish the secondary control connection. Enter the command

to see other

commands executable on the secondary connection. The following commands behave differently when prefaced by

will not define new macros during the auto-login process,

will not erase existing macro definitions,

and

transfer files from the host on the primary control connection to the host on the secondary control connection, and

and

transfer files from the host on the secondary control connection to the host on the primary control connection. Third party file transfers depend upon support of the

protocol

command by the server on the secondary control connection.

Store a local file on the remote machine. If

is left unspecified, the local file name is used after processing according to any

or

settings in naming the remote file. File transfer uses the current settings for

and

Print the name of the current working directory on the remote machine.

A synonym for

The arguments specified are sent, verbatim, to the remote

server.

Throttle the maximum transfer rate to

bytes/second. If

is 0, disable the throttle.

may be one of:

Both directions.

Incoming transfers.

Outgoing transfers.

can be modified on the fly by

bytes (default: 1024) each time a given signal is received:

Increment

by

bytes.

Decrement

by

bytes. The result must be a positive number.

If

is not supplied, the current throttle rates are displayed.

Note:

is not yet implemented for ascii mode transfers.

Set the size of the socket receive buffer to

A synonym for

acts like

except that if

exists and is smaller than

is presumed to be a partially transferred copy of

and the transfer is continued from the apparent point of failure. This command is useful when transferring very large files over networks that are prone to dropping connections.

Set options on the remote

server for

to

(whose absence is handled on a command-specific basis). Remote

commands known to support options include:

(used for

and

Rename the file

on the remote machine, to the file

Clear reply queue. This command re-synchronizes command/reply sequencing with the remote

server. Resynchronization may be necessary following a violation of the

protocol by the remote server.

Restart the immediately following

or

at the indicated

On

systems, marker is usually a byte offset into the file.

Request help from the remote

server. If a

is specified it is supplied to the server as well.

Delete a directory on the remote machine.

With no arguments, show status of remote machine. If

is specified, show status of

on remote machine.

Toggle storing of files on the local system with unique filenames. If a file already exists with a name equal to the target local filename for a

or

command, a

is appended to the name. If the resulting name matches another existing file, a

is appended to the original name. If this process continues up to

an error message is printed, and the transfer does not take place. The generated unique filename will be reported. Note that

will not affect local files generated from a shell command (see below). The default value is off.

A synonym for

Toggle the use of

commands. By default,

will attempt to use a

command when establishing a connection for each data transfer. The use of

commands can prevent delays when performing multiple file transfers. If the

command fails,

will use the default data port. When the use of

commands is disabled, no attempt will be made to use

commands for each data transfer. This is useful for certain

implementations which do ignore

commands but, incorrectly, indicate they've been accepted.

Set

to

If

and

are not given, display all of the options and their values. The currently supported options are:

Defaults to

Defaults to

Defaults to

Defaults to

Defaults to

Defaults to

Defaults to

Defaults to

The arguments specified are sent, verbatim, to the remote

server as a

command.

Return size of

on remote machine.

Set the size of the socket send buffer to

Show the current status of

Set the file transfer

to

The default (and only supported) structure is

Toggle storing of files on remote machine under unique file names. The remote

server must support

protocol

command for successful completion. The remote server will report unique name. Default value is off.

Show the type of operating system running on the remote machine.

Set the file transfer type to that needed to talk to

machines.

A synonym for

Toggle packet tracing.

Set the file transfer

to

If no type is specified, the current type is printed. The default type is network

Set the default umask on the remote server to

If

is omitted, the current umask is printed.

Unset

Refer to

for more information.

Print the usage message for

Identify yourself to the remote

server. If the

is not specified and the server requires it,

will prompt the user for it (after disabling local echo). If an

field is not specified, and the

server requires it, the user will be prompted for it. If an

field is specified, an account command will be relayed to the remote server after the login sequence is completed if the remote server did not require it for logging in. Unless

is invoked with

disabled, this process is done automatically on initial connection to the

server.

Toggle verbose mode. In verbose mode, all responses from the

server are displayed to the user. In addition, if verbose is on, when a file transfer completes, statistics regarding the efficiency of the transfer are reported. By default, verbose is on.

Set the size of the socket send and receive buffers to

A synonym for

Command arguments which have embedded spaces may be quoted with quote

marks.

Commands which toggle settings can take an explicit

or

argument to force the setting appropriately.

Commands which take a byte count as an argument (e.g.,

and

support an optional suffix on the argument which changes the interpretation of the argument. Supported suffixes are:

Causes no modification. (Optional)

Kilo; multiply the argument by 1024

Mega; multiply the argument by 1048576

Giga; multiply the argument by 1073741824

If

receives a

(see the

argument of

or

signal whilst a transfer is in progress, the current transfer rate statistics will be written to the standard error output, in the same format as the standard completion message.

In addition to standard commands, this version of

supports an auto-fetch feature. To enable auto-fetch, simply pass the list of hostnames/files on the command line.

The following formats are valid syntax for an auto-fetch element:

format.

If

contains a glob character and globbing is enabled, (see

then the equivalent of

is performed.

If the directory component of

contains no globbing characters, it is stored locally with the name basename (see

of

in the current directory. Otherwise, the full remote name is used as the local name, relative to the local root directory.

An

URL, retrieved using the

protocol if

isn't defined. Otherwise, transfer the URL using

via the proxy defined in

If

isn't defined and

is given, login as

In this case, use

if supplied, otherwise prompt the user for one.

If a suffix of

or

is supplied, then the transfer type will take place as ascii or binary (respectively). The default transfer type is binary.

In order to be compliant with

interprets the

part of an

auto-fetch URL as follows:

The

immediately after the

is interpreted as a separator before the

and not as part of the

itself.

The

is interpreted as a

list of name components. For all but the last such component,

performs the equivalent of a

command. For the last path component,

performs the equivalent of a

command.

Empty name components, which result from

within the

or from an extra

at the beginning of the

will cause the equivalent of a

command without a directory name. This is unlikely to be useful.

Any

codes (per

within the path components are decoded, with

representing a character code in hexadecimal. This decoding takes place after the

has been split into components, but before each component is used in the equivalent of a

or

command. Some often-used codes are

(which represents

and

(which represents

The above interpretation has the following consequences:

The path is interpreted relative to the default login directory of the specified user or of the

user. If the

directory is required, use a leading path of

If a user's home directory is required (and the remote server supports the syntax), use a leading path of

For example, to retrieve

from

as the user

with the password

use

The exact

and

commands can be controlled by careful choice of where to use

and where to use

(or

For example, the following URLs correspond to the equivalents of the indicated commands:

You must have appropriate access permission for each of the intermediate directories that is used in the equivalent of a

command.

An

URL, retrieved using the

protocol. If

is defined, it is used as a URL to an

proxy server. If

authorization is required to retrieve

and

(and optionally

is in the URL, use them for the first attempt to authenticate.

An

URL, retrieved using the

protocol. If

is defined, it is used as a URL to an

proxy server. If

authorization is required to retrieve

and

(and optionally

is in the URL, use them for the first attempt to authenticate. There is currently no certificate validation and verification.

A local URL, copied from

on the local host.

Display information regarding

no file is retrieved for this auto-fetched element. Supported values include:

Information about

The version of

Useful to provide when reporting problems.

Unless noted otherwise above, and

is not given, the file is stored in the current directory as the

of

Note that if a

redirect is received, the fetch is retried using the new target URL supplied by the server, with a corresponding new

Using an explicit

is recommended, to avoid writing to unexpected file names.

If a classic format or an

URL format has a trailing

or an empty

component, then

will connect to the site and

to the directory given as the path, and leave the user in interactive mode ready for further input. This will not work if

is being used.

Direct

transfers use HTTP 1.1. Proxied

and

transfers use HTTP 1.0.

If

is given, all auto-fetches that don't go via the

or

proxies will be restarted. For

this is implemented by using

instead of

For

this is implemented by using the

directive.

If WWW or proxy WWW authentication is required, you will be prompted to enter a username and password to authenticate with.

When specifying IPv6 numeric addresses in a URL, you need to surround the address in square brackets. E.g.:

This is because colons are used in IPv6 numeric address as well as being the separator for the port number.

To abort a file transfer, use the terminal interrupt key (usually Ctrl-C). Sending transfers will be immediately halted. Receiving transfers will be halted by sending an

protocol

command to the remote server, and discarding any further data received. The speed at which this is accomplished depends upon the remote server's support for

processing. If the remote server does not support the

command, the prompt will not appear until the remote server has completed sending the requested file.

If the terminal interrupt key sequence is used whilst

is awaiting a reply from the remote server for the

processing, then the connection will be closed. This is different from the traditional behaviour (which ignores the terminal interrupt during this phase), but is considered more useful.

Files specified as arguments to

commands are processed according to the following rules.

If the file name

is specified, the

(for reading) or

(for writing) is used.

If the first character of the file name is

the remainder of the argument is interpreted as a shell command.

then forks a shell, using

with the argument supplied, and reads (writes) from the stdout (stdin). If the shell command includes spaces, the argument must be quoted; e.g.

A particularly useful example of this mechanism is:

Failing the above checks, if globbing is enabled, local file names are expanded according to the rules used in the

see the

command. If the

command expects a single local file (e.g.

only the first filename generated by the globbing operation is used.

For

commands and

commands with unspecified local file names, the local filename is the remote filename, which may be altered by a

or

setting. The resulting filename may then be altered if

is on.

For

commands and

commands with unspecified remote file names, the remote filename is the local filename, which may be altered by a

or

setting. The resulting filename may then be altered by the remote server if

is on.

The

specification specifies many parameters which may affect a file transfer. The

may be one of

(binary),

and

(for

and

mostly).

supports the ascii and image types of file transfer, plus local byte size 8 for

mode transfers.

supports only the default values for the remaining file transfer parameters:

and

The

file contains login and initialization information used by the auto-login process. It resides in the user's home directory, unless overridden with the

option, or specified in the

environment variable. The following tokens are recognized; they may be separated by spaces, tabs, or new-lines:

Identify a remote machine

The auto-login process searches the

file for a

token that matches the remote machine specified on the

command line or as an

command argument. Once a match is made, the subsequent

tokens are processed, stopping when the end of file is reached or another

or a

token is encountered.

This is the same as

except that

matches any name. There can be only one

token, and it must be after all

tokens. This is normally used as:

thereby giving the user an automatic anonymous

login to machines not specified in

This can be overridden by using the

flag to disable auto-login.

Identify a user on the remote machine. If this token is present, the auto-login process will initiate a login using the specified

Supply a password. If this token is present, the auto-login process will supply the specified string if the remote server requires a password as part of the login process. Note that if this token is present in the

file for any user other than

will abort the auto-login process if the

is readable by anyone besides the user.

Supply an additional account password. If this token is present, the auto-login process will supply the specified string if the remote server requires an additional account password, or the auto-login process will initiate an

command if it does not.

Define a macro. This token functions like the

command functions. A macro is defined with the specified name; its contents begin with the next

line and continue until a blank line (consecutive new-line characters) is encountered. Like the other tokens in the

file, a

is applicable only to the

definition preceding it. A

entry cannot be used by multiple

definitions; rather, it must be defined following each

it is intended to be used with. If a macro named

is defined, it is automatically executed as the last step in the auto-login process. For example,

default macdef init epsv4 off

followed by a blank line.

supports interactive command line editing, via the

library. It is enabled with the

command, and is enabled by default if input is from a tty. Previous lines can be recalled and edited with the arrow keys, and other GNU Emacs-style editing keys may be used as well.

The

library is configured with a

file — refer to

for more information.

An extra key binding is available to

to provide context sensitive command and filename completion (including remote file completion). To use this, bind a key to the

command

By default, this is bound to the TAB key.

By default,

displays a command line prompt of

to the user. This can be changed with the

command.

A prompt can be displayed on the right side of the screen (after the command input) with the

command.

The following formatting sequences are replaced by the given information:

The current remote working directory.

The trailing component of the current remote working directory, or

trailing components if a digit

is given. If

begins with

the number of skipped components precede the trailing component(s) in the format

(for

or

(for

The remote host name.

The remote host name, up to the first dot

The remote user name.

A single percent character

uses the following environment variables.

Password to send in an anonymous

transfer. Defaults to

Overrides the default operation mode. Support values are:

active mode

only

automatic determination of passive or active (this is the default)

gate-ftp mode

passive mode

only

Command-line prompt to use. Defaults to

Refer to

for more information.

Command-line right side prompt to use. Defaults to empty string. Refer to

for more information.

Host to use as gate-ftp server when

is enabled.

Port to use when connecting to gate-ftp server when

is enabled. Default is port returned by a

lookup of

The value to send for the

User-Agent header.

For default location of a

file, if one exists.

An alternate location of the

file.

Used by various commands to display files. Defaults to

if empty or not set.

For default shell.

URL of

proxy to use when making

URL requests (if not defined, use the standard

protocol).

See

for further notes about proxy use.

URL of

proxy to use when making

URL requests. If proxy authentication is required and there is a username and password in this URL, they will automatically be used in the first attempt to authenticate to the proxy.

If

URL characters are required in the username or password (for example

or

encode them with

encoding.

Note that the use of a username and password in

and

may be incompatible with other programs that use it (such as

this is not used for interactive sessions, only for command-line fetches.

URL of

proxy to use when making

URL requests.

See

for further notes about proxy use.

A space or comma separated list of hosts (or domains) for which proxying is not to be used. Each entry may have an optional trailing

which restricts the matching to connections to that port.

Some firewall configurations do not allow

to use extended passive mode. If you find that even a simple

appears to hang after printing a message such as this:

then you will need to disable extended passive mode with

See the above section

for an example of how to make this automatic.

attempts to be compliant with:

The

command appeared in

Various features such as command line editing, context sensitive command and file completion, dynamic progress bar, automatic fetching of files and URLs, modification time preservation, transfer rate throttling, configurable command line prompt, and other enhancements over the standard

were implemented in

and later releases by

IPv6 support was added by the WIDE/KAME project (but may not be present in all non-NetBSD versions of this program, depending if the operating system supports IPv6 in a similar manner to KAME).

Correct execution of many commands depends upon proper behavior by the remote server.

An error in the treatment of carriage returns in the

ascii-mode transfer code has been corrected. This correction may result in incorrect transfers of binary files to and from

servers using the ascii type. Avoid this problem by using the binary image type.

assumes that all IPv4 mapped addresses

IPv6 addresses with a form like

indicate IPv4 destinations which can be handled by

sockets. However, in certain IPv6 network configurations, this assumption is not true. In such an environment, IPv4 mapped addresses must be passed to

sockets directly. For example, if your site uses a SIIT translator for IPv6-to-IPv4 translation,

is unable to support your configuration.