2016-07-25 20:18:56 +02:00
---
title: "Crypt"
description: "Encryption overlay remote"
2022-11-17 18:56:24 +01:00
versionIntroduced: "v1.33"
2016-07-25 20:18:56 +02:00
---
2022-11-19 12:50:20 +01:00
# {{< icon "fa fa-lock" >}} Crypt
2016-07-25 20:18:56 +02:00
2020-10-05 18:19:00 +02:00
Rclone `crypt` remotes encrypt and decrypt other remotes.
2016-07-25 20:18:56 +02:00
2020-11-25 18:50:44 +01:00
A remote of type `crypt` does not access a [storage system ](https://rclone.org/overview/ )
directly, but instead wraps another remote, which in turn accesses
the storage system. This is similar to how [alias ](https://rclone.org/alias/ ),
[union ](https://rclone.org/union/ ), [chunker ](https://rclone.org/chunker/ )
and a few others work. It makes the usage very flexible, as you can
add a layer, in this case an encryption layer, on top of any other
backend, even in multiple layers. Rclone's functionality
can be used as with any other remote, for example you can
[mount ](https://rclone.org/commands/rclone_mount/ ) a crypt remote.
Accessing a storage system through a crypt remote realizes client-side
encryption, which makes it safe to keep your data in a location you do
not trust will not get compromised.
When working against the `crypt` remote, rclone will automatically
encrypt (before uploading) and decrypt (after downloading) on your local
system as needed on the fly, leaving the data encrypted at rest in the
wrapped remote. If you access the storage system using an application
other than rclone, or access the wrapped remote directly using rclone,
there will not be any encryption/decryption: Downloading existing content
will just give you the encrypted (scrambled) format, and anything you
upload will *not* become encrypted.
The encryption is a secret-key encryption (also called symmetric key encryption)
algorithm, where a password (or pass phrase) is used to generate real encryption key.
The password can be supplied by user, or you may chose to let rclone
generate one. It will be stored in the configuration file, in a lightly obscured form.
If you are in an environment where you are not able to keep your configuration
secured, you should add
[configuration encryption ](https://rclone.org/docs/#configuration-encryption )
as protection. As long as you have this configuration file, you will be able to
decrypt your data. Without the configuration file, as long as you remember
the password (or keep it in a safe place), you can re-create the configuration
and gain access to the existing data. You may also configure a corresponding
remote in a different installation to access the same data.
See below for guidance to [changing password ](#changing-password ).
Encryption uses [cryptographic salt ](https://en.wikipedia.org/wiki/Salt_(cryptography )),
to permute the encryption key so that the same string may be encrypted in
different ways. When configuring the crypt remote it is optional to enter a salt,
or to let rclone generate a unique salt. If omitted, rclone uses a built-in unique string.
Normally in cryptography, the salt is stored together with the encrypted content,
and do not have to be memorized by the user. This is not the case in rclone,
because rclone does not store any additional information on the remotes. Use of
custom salt is effectively a second password that must be memorized.
[File content ](#file-encryption ) encryption is performed using
[NaCl SecretBox ](https://godoc.org/golang.org/x/crypto/nacl/secretbox ),
based on XSalsa20 cipher and Poly1305 for integrity.
[Names ](#name-encryption ) (file- and directory names) are also encrypted
by default, but this has some implications and is therefore
2023-02-28 12:50:53 +01:00
possible to be turned off.
2020-11-25 18:50:44 +01:00
2021-10-14 15:40:18 +02:00
## Configuration
2020-11-25 18:50:44 +01:00
Here is an example of how to make a remote called `secret` .
To use `crypt` , first set up the underlying remote. Follow the
`rclone config` instructions for the specific backend.
2016-07-25 20:18:56 +02:00
2020-10-05 18:19:00 +02:00
Before configuring the crypt remote, check the underlying remote is
2020-11-25 18:50:44 +01:00
working. In this example the underlying remote is called `remote` .
We will configure a path `path` within this remote to contain the
encrypted content. Anything inside `remote:path` will be encrypted
and anything outside will not.
2020-10-05 18:19:00 +02:00
Configure `crypt` using `rclone config` . In this example the `crypt`
remote is called `secret` , to differentiate it from the underlying
`remote` .
2016-07-25 20:18:56 +02:00
2020-11-25 18:50:44 +01:00
When you are done you can use the crypt remote named `secret` just
as you would with any other remote, e.g. `rclone copy D:\docs secret:\docs` ,
and rclone will encrypt and decrypt as needed on the fly.
If you access the wrapped remote `remote:path` directly you will bypass
the encryption, and anything you read will be in encrypted form, and
2021-02-17 17:11:57 +01:00
anything you write will be unencrypted. To avoid issues it is best to
2020-11-25 18:50:44 +01:00
configure a dedicated path for encrypted content, and access it
exclusively through a crypt remote.
2016-07-25 20:18:56 +02:00
```
2021-11-01 21:34:46 +01:00
No remotes found, make a new one?
2016-07-25 20:18:56 +02:00
n) New remote
s) Set configuration password
q) Quit config
2020-11-25 18:50:44 +01:00
n/s/q> n
2016-07-25 20:18:56 +02:00
name> secret
Type of storage to configure.
2020-11-25 18:50:44 +01:00
Enter a string value. Press Enter for the default ("").
2016-07-25 20:18:56 +02:00
Choose a number from below, or type in your own value
2019-08-26 11:47:17 +02:00
[snip]
XX / Encrypt/Decrypt a remote
2016-07-25 20:18:56 +02:00
\ "crypt"
2019-08-26 11:47:17 +02:00
[snip]
Storage> crypt
2020-11-25 18:50:44 +01:00
** See help for crypt backend at: https://rclone.org/crypt/ **
2016-07-25 20:18:56 +02:00
Remote to encrypt/decrypt.
2020-11-25 18:50:44 +01:00
Normally should contain a ':' and a path, eg "myremote:path/to/dir",
2017-01-09 06:09:19 +01:00
"myremote:bucket" or maybe "myremote:" (not recommended).
2020-11-25 18:50:44 +01:00
Enter a string value. Press Enter for the default ("").
2016-07-25 20:18:56 +02:00
remote> remote:path
2016-08-20 19:46:10 +02:00
How to encrypt the filenames.
2020-11-25 18:50:44 +01:00
Enter a string value. Press Enter for the default ("standard").
2021-08-16 14:50:03 +02:00
Choose a number from below, or type in your own value.
/ Encrypt the filenames.
1 | See the docs for the details.
2016-08-20 19:46:10 +02:00
\ "standard"
2020-11-25 18:50:44 +01:00
2 / Very simple filename obfuscation.
2017-03-12 19:14:36 +01:00
\ "obfuscate"
2021-08-16 14:50:03 +02:00
/ Don't encrypt the file names.
3 | Adds a ".bin" extension only.
2020-11-25 18:50:44 +01:00
\ "off"
filename_encryption>
2017-11-06 08:35:53 +01:00
Option to either encrypt directory names or leave them intact.
2020-11-25 18:50:44 +01:00
NB If filename_encryption is "off" then this option will do nothing.
Enter a boolean value (true or false). Press Enter for the default ("true").
2017-11-06 08:35:53 +01:00
Choose a number from below, or type in your own value
1 / Encrypt directory names.
\ "true"
2 / Don't encrypt directory names, leave them intact.
\ "false"
2020-11-25 18:50:44 +01:00
directory_name_encryption>
2016-07-25 20:18:56 +02:00
Password or pass phrase for encryption.
2016-08-20 19:46:10 +02:00
y) Yes type in my own password
g) Generate random password
y/g> y
2016-07-25 20:18:56 +02:00
Enter the password:
password:
Confirm the password:
password:
2016-08-20 19:46:10 +02:00
Password or pass phrase for salt. Optional but recommended.
Should be different to the previous password.
y) Yes type in my own password
g) Generate random password
2020-11-25 18:50:44 +01:00
n) No leave this optional password blank (default)
2016-08-20 19:46:10 +02:00
y/g/n> g
Password strength in bits.
64 is just about memorable
128 is secure
1024 is the maximum
Bits> 128
Your password is: JAsJvRcgR-_veXNfy_sGmQ
2020-11-25 18:50:44 +01:00
Use this password? Please note that an obscured version of this
password (and not the password itself) will be stored under your
configuration file, so keep this generated password in a safe place.
y) Yes (default)
2016-08-20 19:46:10 +02:00
n) No
2020-11-25 18:50:44 +01:00
y/n>
Edit advanced config? (y/n)
y) Yes
n) No (default)
y/n>
2016-07-25 20:18:56 +02:00
Remote config
--------------------
[secret]
2020-11-25 18:50:44 +01:00
type = crypt
2016-07-25 20:18:56 +02:00
remote = remote:path
2016-10-08 12:26:14 +02:00
password = ** * ENCRYPTED ** *
password2 = ** * ENCRYPTED ** *
2016-07-25 20:18:56 +02:00
--------------------
2020-11-25 18:50:44 +01:00
y) Yes this is OK (default)
2016-07-25 20:18:56 +02:00
e) Edit this remote
d) Delete this remote
2020-11-25 18:50:44 +01:00
y/e/d>
2016-07-25 20:18:56 +02:00
```
2020-10-05 18:19:00 +02:00
**Important** The crypt password stored in `rclone.conf` is lightly
obscured. That only protects it from cursory inspection. It is not
2020-11-25 18:50:44 +01:00
secure unless [configuration encryption ](https://rclone.org/docs/#configuration-encryption ) of `rclone.conf` is specified.
2016-07-25 20:18:56 +02:00
2020-10-05 18:19:00 +02:00
A long passphrase is recommended, or `rclone config` can generate a
random one.
2020-03-25 22:53:59 +01:00
2020-10-05 18:19:00 +02:00
The obscured password is created using AES-CTR with a static key. The
salt is stored verbatim at the beginning of the obscured password. This
static key is shared between all versions of rclone.
2020-03-25 22:53:59 +01:00
If you reconfigure rclone with the same passwords/passphrases
elsewhere it will be compatible, but the obscured version will be different
due to the different salt.
2016-07-25 20:18:56 +02:00
2020-10-05 18:19:00 +02:00
Rclone does not encrypt
2017-03-02 16:07:25 +01:00
2020-05-19 13:02:44 +02:00
* file length - this can be calculated within 16 bytes
2016-07-25 20:18:56 +02:00
* modification time - used for syncing
2020-11-25 18:50:44 +01:00
### Specifying the remote
When configuring the remote to encrypt/decrypt, you may specify any
string that rclone accepts as a source/destination of other commands.
2016-10-08 11:52:29 +02:00
2020-11-25 18:50:44 +01:00
The primary use case is to specify the path into an already configured
remote (e.g. `remote:path/to/dir` or `remote:bucket` ), such that
data in a remote untrusted location can be stored encrypted.
2020-10-05 18:19:00 +02:00
2020-11-25 18:50:44 +01:00
You may also specify a local filesystem path, such as
`/path/to/dir` on Linux, `C:\path\to\dir` on Windows. By creating
a crypt remote pointing to such a local filesystem path, you can
use rclone as a utility for pure local file encryption, for example
to keep encrypted files on a removable USB drive.
**Note**: A string which do not contain a `:` will by rclone be treated
as a relative path in the local filesystem. For example, if you enter
the name `remote` without the trailing `:` , it will be treated as
a subdirectory of the current directory with name "remote".
If a path `remote:path/to/dir` is specified, rclone stores encrypted
2020-10-05 18:19:00 +02:00
files in `path/to/dir` on the remote. With file name encryption, files
saved to `secret:subdir/subfile` are stored in the unencrypted path
`path/to/dir` but the `subdir/subpath` element is encrypted.
2016-10-08 11:52:29 +02:00
2020-11-25 18:50:44 +01:00
The path you specify does not have to exist, rclone will create
it when needed.
If you intend to use the wrapped remote both directly for keeping
unencrypted content, as well as through a crypt remote for encrypted
content, it is recommended to point the crypt remote to a separate
2021-11-04 12:50:43 +01:00
directory within the wrapped remote. If you use a bucket-based storage
2022-10-04 18:10:00 +02:00
system (e.g. Swift, S3, Google Compute Storage, B2) it is generally
2020-11-25 18:50:44 +01:00
advisable to wrap the crypt remote around a specific bucket (`s3:bucket`).
If wrapping around the entire root of the storage (`s3:`), and use the
optional file name encryption, rclone will encrypt the bucket name.
### Changing password
Should the password, or the configuration file containing a lightly obscured
form of the password, be compromised, you need to re-encrypt your data with
a new password. Since rclone uses secret-key encryption, where the encryption
key is generated directly from the password kept on the client, it is not
possible to change the password/key of already encrypted content. Just changing
the password configured for an existing crypt remote means you will no longer
able to decrypt any of the previously encrypted content. The only possibility
is to re-upload everything via a crypt remote configured with your new password.
2022-08-14 04:56:32 +02:00
Depending on the size of your data, your bandwidth, storage quota etc, there are
2020-11-25 18:50:44 +01:00
different approaches you can take:
- If you have everything in a different location, for example on your local system,
you could remove all of the prior encrypted files, change the password for your
configured crypt remote (or delete and re-create the crypt configuration),
and then re-upload everything from the alternative location.
- If you have enough space on the storage system you can create a new crypt
remote pointing to a separate directory on the same backend, and then use
rclone to copy everything from the original crypt remote to the new,
effectively decrypting everything on the fly using the old password and
re-encrypting using the new password. When done, delete the original crypt
remote directory and finally the rclone crypt configuration with the old password.
All data will be streamed from the storage system and back, so you will
2022-08-14 04:56:32 +02:00
get half the bandwidth and be charged twice if you have upload and download quota
2020-11-25 18:50:44 +01:00
on the storage system.
**Note**: A security problem related to the random password generator
was fixed in rclone version 1.53.3 (released 2020-11-19). Passwords generated
by rclone config in version 1.49.0 (released 2019-08-26) to 1.53.2
(released 2020-10-26) are not considered secure and should be changed.
If you made up your own password, or used rclone version older than 1.49.0 or
newer than 1.53.2 to generate it, you are *not* affected by this issue.
See [issue #4783 ](https://github.com/rclone/rclone/issues/4783 ) for more
details, and a tool you can use to check if you are affected.
### Example
2016-07-25 20:18:56 +02:00
2020-10-05 18:19:00 +02:00
Create the following file structure using "standard" file name
2016-08-20 19:46:10 +02:00
encryption.
2016-07-25 20:18:56 +02:00
```
plaintext/
├── file0.txt
├── file1.txt
└── subdir
├── file2.txt
├── file3.txt
└── subsubdir
└── file4.txt
```
2020-10-05 18:19:00 +02:00
Copy these to the remote, and list them
2016-07-25 20:18:56 +02:00
```
$ rclone -q copy plaintext secret:
$ rclone -q ls secret:
7 file1.txt
6 file0.txt
8 subdir/file2.txt
10 subdir/subsubdir/file4.txt
9 subdir/file3.txt
```
2020-10-05 18:19:00 +02:00
The crypt remote looks like
2016-07-25 20:18:56 +02:00
```
$ rclone -q ls remote:path
55 hagjclgavj2mbiqm6u6cnjjqcg
54 v05749mltvv1tf4onltun46gls
57 86vhrsv86mpbtd3a0akjuqslj8/dlj7fkq4kdq72emafg7a7s41uo
58 86vhrsv86mpbtd3a0akjuqslj8/7uu829995du6o42n32otfhjqp4/b9pausrfansjth5ob3jkdqd4lc
56 86vhrsv86mpbtd3a0akjuqslj8/8njh1sk437gttmep3p70g81aps
```
2020-10-05 18:19:00 +02:00
The directory structure is preserved
2016-07-25 20:18:56 +02:00
```
$ rclone -q ls secret:subdir
8 file2.txt
9 file3.txt
10 subsubdir/file4.txt
```
2020-10-05 18:19:00 +02:00
Without file name encryption `.bin` extensions are added to underlying
names. This prevents the cloud provider attempting to interpret file
content.
2016-07-25 20:18:56 +02:00
```
$ rclone -q ls remote:path
2016-08-20 19:46:10 +02:00
54 file0.txt.bin
57 subdir/file3.txt.bin
56 subdir/file2.txt.bin
58 subdir/subsubdir/file4.txt.bin
55 file1.txt.bin
2016-07-25 20:18:56 +02:00
```
2020-11-25 18:50:44 +01:00
### File name encryption modes
2016-07-25 20:18:56 +02:00
2016-08-20 19:46:10 +02:00
Off
2017-03-02 16:07:25 +01:00
2016-08-20 19:46:10 +02:00
* doesn't hide file names or directory structure
* allows for longer file names (~246 characters)
* can use sub paths and copy single files
2016-07-25 20:18:56 +02:00
2016-08-20 19:46:10 +02:00
Standard
2017-03-02 16:07:25 +01:00
2016-08-20 19:46:10 +02:00
* file names encrypted
2018-02-06 19:26:58 +01:00
* file names can't be as long (~143 characters)
2016-07-25 20:18:56 +02:00
* can use sub paths and copy single files
2017-10-28 08:03:51 +02:00
* directory structure visible
2016-07-25 20:18:56 +02:00
* identical files names will have identical uploaded names
* can use shortcuts to shorten the directory recursion
2017-03-12 19:14:36 +01:00
Obfuscation
This is a simple "rotate" of the filename, with each file having a rot
2020-10-05 18:19:00 +02:00
distance based on the filename. Rclone stores the distance at the
beginning of the filename. A file called "hello" may become "53.jgnnq".
2017-03-12 19:14:36 +01:00
2020-10-05 18:19:00 +02:00
Obfuscation is not a strong encryption of filenames, but hinders
automated scanning tools picking up on filename patterns. It is an
intermediate between "off" and "standard" which allows for longer path
segment names.
2017-03-12 19:14:36 +01:00
There is a possibility with some unicode based filenames that the
obfuscation is weak and may map lower case characters to upper case
2020-11-25 18:50:44 +01:00
equivalents.
2020-10-05 18:19:00 +02:00
Obfuscation cannot be relied upon for strong protection.
2017-03-12 19:14:36 +01:00
* file names very lightly obfuscated
* file names can be longer than standard encryption
* can use sub paths and copy single files
2017-10-28 08:03:51 +02:00
* directory structure visible
2017-03-12 19:14:36 +01:00
* identical files names will have identical uploaded names
2020-10-05 18:19:00 +02:00
Cloud storage systems have limits on file name length and
total path length which rclone is more likely to breach using
2022-01-03 18:46:40 +01:00
"Standard" file name encryption. Where file names are less than 156
2020-10-05 18:19:00 +02:00
characters in length issues should not be encountered, irrespective of
cloud storage provider.
2016-08-20 19:46:10 +02:00
2021-11-13 04:48:34 +01:00
An experimental advanced option `filename_encoding` is now provided to
address this problem to a certain degree.
For cloud storage systems with case sensitive file names (e.g. Google Drive),
`base64` can be used to reduce file name length.
For cloud storage systems using UTF-16 to store file names internally
(e.g. OneDrive), `base32768` can be used to drastically reduce
file name length.
2020-10-05 18:19:00 +02:00
An alternative, future rclone file name encryption mode may tolerate
backend provider path length limits.
2016-07-25 20:18:56 +02:00
2020-11-25 18:50:44 +01:00
### Directory name encryption
2017-11-06 08:35:53 +01:00
Crypt offers the option of encrypting dir names or leaving them intact.
There are two options:
True
Encrypts the whole file path including directory names
Example:
`1/12/123.txt` is encrypted to
`p0e52nreeaj0a5ea7s64m4j72s/l42g6771hnv3an9cgc8cr2n1ng/qgm4avr35m5loi1th53ato71v0`
False
Only encrypts file names, skips directory names
Example:
2018-03-17 12:59:25 +01:00
`1/12/123.txt` is encrypted to
2017-11-06 08:35:53 +01:00
`1/12/qgm4avr35m5loi1th53ato71v0`
2020-11-25 18:50:44 +01:00
### Modified time and hashes
2016-10-05 17:19:09 +02:00
Crypt stores modification times using the underlying remote so support
depends on that.
2020-10-05 18:19:00 +02:00
Hashes are not stored for crypt. However the data integrity is
2016-10-05 17:19:09 +02:00
protected by an extremely strong crypto authenticator.
2020-10-05 18:19:00 +02:00
Use the `rclone cryptcheck` command to check the
2017-02-12 17:49:31 +01:00
integrity of a crypted remote instead of `rclone check` which can't
check the checksums properly.
2020-05-22 13:22:52 +02:00
{{< rem autogenerated options start " - DO NOT EDIT - instead edit fs . RegInfo in backend / crypt / crypt . go then run make backenddocs " > }}
2021-11-01 16:42:05 +01:00
### Standard options
2018-10-01 21:48:54 +02:00
2022-07-09 19:08:20 +02:00
Here are the Standard options specific to crypt (Encrypt/Decrypt a remote).
2018-10-01 21:48:54 +02:00
#### --crypt-remote
Remote to encrypt/decrypt.
2021-11-01 16:42:05 +01:00
2020-10-13 23:49:58 +02:00
Normally should contain a ':' and a path, e.g. "myremote:path/to/dir",
2018-10-01 21:48:54 +02:00
"myremote:bucket" or maybe "myremote:" (not recommended).
2022-03-18 13:29:54 +01:00
Properties:
2018-10-01 21:48:54 +02:00
- Config: remote
- Env Var: RCLONE_CRYPT_REMOTE
- Type: string
2022-03-18 13:29:54 +01:00
- Required: true
2018-10-01 21:48:54 +02:00
#### --crypt-filename-encryption
How to encrypt the filenames.
2022-03-18 13:29:54 +01:00
Properties:
2018-10-01 21:48:54 +02:00
- Config: filename_encryption
- Env Var: RCLONE_CRYPT_FILENAME_ENCRYPTION
- Type: string
- Default: "standard"
- Examples:
- "standard"
2021-11-01 16:42:05 +01:00
- Encrypt the filenames.
- See the docs for the details.
2018-10-01 21:48:54 +02:00
- "obfuscate"
- Very simple filename obfuscation.
2020-02-01 11:31:42 +01:00
- "off"
2021-11-01 16:42:05 +01:00
- Don't encrypt the file names.
- Adds a ".bin" extension only.
2023-01-11 13:42:43 +01:00
- May cause problems on [case insensitive ](/overview/#case-insensitive ) [storage systems ](/overview/#features ) like OneDrive, Dropbox, Windows, OSX and SMB.
2018-10-01 21:48:54 +02:00
#### --crypt-directory-name-encryption
Option to either encrypt directory names or leave them intact.
2020-05-22 13:22:52 +02:00
NB If filename_encryption is "off" then this option will do nothing.
2022-03-18 13:29:54 +01:00
Properties:
2018-10-01 21:48:54 +02:00
- Config: directory_name_encryption
- Env Var: RCLONE_CRYPT_DIRECTORY_NAME_ENCRYPTION
- Type: bool
- Default: true
- Examples:
- "true"
- Encrypt directory names.
- "false"
- Don't encrypt directory names, leave them intact.
2023-01-11 13:42:43 +01:00
- May cause problems on [case insensitive ](/overview/#case-insensitive ) [storage systems ](/overview/#features ) like OneDrive, Dropbox, Windows, OSX and SMB.
2018-10-01 21:48:54 +02:00
#### --crypt-password
Password or pass phrase for encryption.
2020-09-02 17:59:04 +02:00
**NB** Input to this must be obscured - see [rclone obscure ](/commands/rclone_obscure/ ).
2022-03-18 13:29:54 +01:00
Properties:
2018-10-01 21:48:54 +02:00
- Config: password
- Env Var: RCLONE_CRYPT_PASSWORD
- Type: string
2022-03-18 13:29:54 +01:00
- Required: true
2018-10-01 21:48:54 +02:00
#### --crypt-password2
2021-11-01 16:42:05 +01:00
Password or pass phrase for salt.
Optional but recommended.
2018-10-01 21:48:54 +02:00
Should be different to the previous password.
2020-09-02 17:59:04 +02:00
**NB** Input to this must be obscured - see [rclone obscure ](/commands/rclone_obscure/ ).
2022-03-18 13:29:54 +01:00
Properties:
2018-10-01 21:48:54 +02:00
- Config: password2
- Env Var: RCLONE_CRYPT_PASSWORD2
- Type: string
2022-03-18 13:29:54 +01:00
- Required: false
2018-10-01 21:48:54 +02:00
2021-11-01 16:42:05 +01:00
### Advanced options
2018-10-01 21:48:54 +02:00
2022-07-09 19:08:20 +02:00
Here are the Advanced options specific to crypt (Encrypt/Decrypt a remote).
2018-10-01 21:48:54 +02:00
2020-09-02 17:59:04 +02:00
#### --crypt-server-side-across-configs
2020-10-13 23:49:58 +02:00
Allow server-side operations (e.g. copy) to work across different crypt configs.
2020-09-02 17:59:04 +02:00
Normally this option is not what you want, but if you have two crypts
pointing to the same backend you can use it.
This can be used, for example, to change file name encryption type
without re-uploading all the data. Just make two crypt backends
pointing to two different directories with the single changed
parameter and use rclone move to move the files between the crypt
remotes.
2022-03-18 13:29:54 +01:00
Properties:
2020-09-02 17:59:04 +02:00
- Config: server_side_across_configs
- Env Var: RCLONE_CRYPT_SERVER_SIDE_ACROSS_CONFIGS
- Type: bool
- Default: false
2018-10-01 21:48:54 +02:00
#### --crypt-show-mapping
For all files listed show how the names encrypt.
If this flag is set then for each file that the remote is asked to
list, it will log (at level INFO) a line stating the decrypted file
name and the encrypted file name.
This is so you can work out which encrypted names are which decrypted
names just in case you need to do something with the encrypted file
names, or for debugging purposes.
2022-03-18 13:29:54 +01:00
Properties:
2018-10-01 21:48:54 +02:00
- Config: show_mapping
- Env Var: RCLONE_CRYPT_SHOW_MAPPING
- Type: bool
- Default: false
2021-03-31 20:12:08 +02:00
#### --crypt-no-data-encryption
Option to either encrypt file data or leave it unencrypted.
2022-03-18 13:29:54 +01:00
Properties:
2021-03-31 20:12:08 +02:00
- Config: no_data_encryption
- Env Var: RCLONE_CRYPT_NO_DATA_ENCRYPTION
- Type: bool
- Default: false
- Examples:
- "true"
- Don't encrypt file data, leave it unencrypted.
- "false"
- Encrypt file data.
2022-03-18 13:29:54 +01:00
#### --crypt-filename-encoding
How to encode the encrypted filename to text string.
This option could help with shortening the encrypted filename. The
suitable option would depend on the way your remote count the filename
2022-08-14 04:56:32 +02:00
length and if it's case sensitive.
2022-03-18 13:29:54 +01:00
Properties:
- Config: filename_encoding
- Env Var: RCLONE_CRYPT_FILENAME_ENCODING
- Type: string
- Default: "base32"
- Examples:
- "base32"
- Encode using base32. Suitable for all remote.
- "base64"
- Encode using base64. Suitable for case sensitive remote.
- "base32768"
- Encode using base32768. Suitable if your remote counts UTF-16 or
- Unicode codepoint instead of UTF-8 byte length. (Eg. Onedrive)
2022-07-09 19:08:20 +02:00
### Metadata
Any metadata supported by the underlying remote is read and written.
See the [metadata ](/docs/#metadata ) docs for more info.
2021-11-01 16:42:05 +01:00
## Backend commands
2020-05-22 13:22:52 +02:00
Here are the commands specific to the crypt backend.
2020-05-27 17:11:47 +02:00
Run them with
2020-05-22 13:22:52 +02:00
rclone backend COMMAND remote:
The help below will explain what arguments each command takes.
2022-07-09 19:08:20 +02:00
See the [backend ](/commands/rclone_backend/ ) command for more
2020-05-22 13:22:52 +02:00
info on how to pass options and arguments.
These can be run on a running backend using the rc command
2022-03-18 13:29:54 +01:00
[backend/command ](/rc/#backend-command ).
2020-05-22 13:22:52 +02:00
2021-11-01 16:42:05 +01:00
### encode
2020-05-22 13:22:52 +02:00
Encode the given filename(s)
rclone backend encode remote: [options] [< arguments > +]
This encodes the filenames given as arguments returning a list of
strings of the encoded results.
Usage Example:
rclone backend encode crypt: file1 [file2...]
rclone rc backend/command command=encode fs=crypt: file1 [file2...]
2021-11-01 16:42:05 +01:00
### decode
2020-05-22 13:22:52 +02:00
Decode the given filename(s)
rclone backend decode remote: [options] [< arguments > +]
This decodes the filenames given as arguments returning a list of
strings of the decoded results. It will return an error if any of the
inputs are invalid.
Usage Example:
rclone backend decode crypt: encryptedfile1 [encryptedfile2...]
rclone rc backend/command command=decode fs=crypt: encryptedfile1 [encryptedfile2...]
{{< rem autogenerated options stop > }}
2017-01-29 11:12:52 +01:00
2020-11-25 18:50:44 +01:00
## Backing up a crypted remote
2017-02-12 17:49:31 +01:00
2020-05-19 13:02:44 +02:00
If you wish to backup a crypted remote, it is recommended that you use
2017-02-12 17:49:31 +01:00
`rclone sync` on the encrypted files, and make sure the passwords are
the same in the new encrypted remote.
This will have the following advantages
* `rclone sync` will check the checksums while copying
* you can use `rclone check` between the encrypted remotes
2017-10-28 08:03:51 +02:00
* you don't decrypt and encrypt unnecessarily
2017-02-12 17:49:31 +01:00
For example, let's say you have your original remote at `remote:` with
the encrypted version at `eremote:` with path `remote:crypt` . You
would then set up the new remote `remote2:` and then the encrypted
version `eremote2:` with path `remote2:crypt` using the same passwords
as `eremote:` .
To sync the two remotes you would do
2023-01-20 21:47:36 +01:00
rclone sync --interactive remote:crypt remote2:crypt
2017-02-12 17:49:31 +01:00
And to check the integrity you would do
rclone check remote:crypt remote2:crypt
2020-11-25 18:50:44 +01:00
## File formats
2016-07-25 20:18:56 +02:00
2020-11-25 18:50:44 +01:00
### File encryption
2016-07-25 20:18:56 +02:00
Files are encrypted 1:1 source file to destination object. The file
has a header and is divided into chunks.
2020-11-25 18:50:44 +01:00
#### Header
2016-07-25 20:18:56 +02:00
* 8 bytes magic string `RCLONE\x00\x00`
* 24 bytes Nonce (IV)
The initial nonce is generated from the operating systems crypto
2017-10-28 08:03:51 +02:00
strong random number generator. The nonce is incremented for each
2016-07-25 20:18:56 +02:00
chunk read making sure each nonce is unique for each block written.
2017-10-28 08:03:51 +02:00
The chance of a nonce being re-used is minuscule. If you wrote an
2016-07-25 20:18:56 +02:00
exabyte of data (10¹⁸ bytes) you would have a probability of
approximately 2× 10⁻³² of re-using a nonce.
2020-11-25 18:50:44 +01:00
#### Chunk
2016-07-25 20:18:56 +02:00
2021-03-02 20:11:57 +01:00
Each chunk will contain 64 KiB of data, except for the last one which
2020-11-25 18:50:44 +01:00
may have less data. The data chunk is in standard NaCl SecretBox
format. SecretBox uses XSalsa20 and Poly1305 to encrypt and
2016-07-25 20:18:56 +02:00
authenticate messages.
Each chunk contains:
* 16 Bytes of Poly1305 authenticator
* 1 - 65536 bytes XSalsa20 encrypted data
64k chunk size was chosen as the best performing chunk size (the
authenticator takes too much time below this and the performance drops
off due to cache effects above this). Note that these chunks are
buffered in memory so they can't be too big.
This uses a 32 byte (256 bit key) key derived from the user password.
2020-11-25 18:50:44 +01:00
#### Examples
2016-07-25 20:18:56 +02:00
1 byte file will encrypt to
* 32 bytes header
* 17 bytes data chunk
49 bytes total
2021-03-02 20:11:57 +01:00
1 MiB (1048576 bytes) file will encrypt to
2016-07-25 20:18:56 +02:00
* 32 bytes header
* 16 chunks of 65568 bytes
2021-03-02 20:11:57 +01:00
1049120 bytes total (a 0.05% overhead). This is the overhead for big
2016-07-25 20:18:56 +02:00
files.
2020-11-25 18:50:44 +01:00
### Name encryption
2016-07-25 20:18:56 +02:00
2016-08-20 19:46:10 +02:00
File names are encrypted segment by segment - the path is broken up
into `/` separated strings and these are encrypted individually.
2016-07-25 20:18:56 +02:00
2020-05-19 13:02:44 +02:00
File segments are padded using PKCS#7 to a multiple of 16 bytes
2016-08-20 19:46:10 +02:00
before encryption.
2016-07-25 20:18:56 +02:00
They are then encrypted with EME using AES with 256 bit key. EME
(ECB-Mix-ECB) is a wide-block encryption mode presented in the 2003
paper "A Parallelizable Enciphering Mode" by Halevi and Rogaway.
2017-10-28 08:03:51 +02:00
This makes for deterministic encryption which is what we want - the
2016-08-20 19:46:10 +02:00
same filename must encrypt to the same thing otherwise we can't find
it on the cloud storage system.
2016-07-25 20:18:56 +02:00
This means that
* filenames with the same name will encrypt the same
* filenames which start the same won't have a common prefix
This uses a 32 byte key (256 bits) and a 16 byte (128 bits) IV both of
which are derived from the user password.
After encryption they are written out using a modified version of
standard `base32` encoding as described in RFC4648. The standard
encoding is modified in two ways:
* it becomes lower case (no-one likes upper case filenames!)
* we strip the padding character `=`
`base32` is used rather than the more efficient `base64` so rclone can be
2020-10-13 23:49:58 +02:00
used on case insensitive remotes (e.g. Windows, Amazon Drive).
2016-07-25 20:18:56 +02:00
2020-11-25 18:50:44 +01:00
### Key derivation
2016-07-25 20:18:56 +02:00
2017-10-28 08:03:51 +02:00
Rclone uses `scrypt` with parameters `N=16384, r=8, p=1` with an
2016-08-20 19:46:10 +02:00
optional user supplied salt (password2) to derive the 32+32+16 = 80
bytes of key material required. If the user doesn't supply a salt
then rclone uses an internal one.
2016-07-25 20:18:56 +02:00
`scrypt` makes it impractical to mount a dictionary attack on rclone
2017-10-28 08:03:51 +02:00
encrypted data. For full protection against this you should always use
2016-08-20 19:46:10 +02:00
a salt.
2020-07-13 02:04:59 +02:00
## SEE ALSO
* [rclone cryptdecode ](/commands/rclone_cryptdecode/ ) - Show forward/reverse mapping of encrypted filenames