Easily and securely share files from the command line. A fully featured Firefox Send client.

Overview

Build status on GitLab CI Newest release on crates.io Project license

Notice: the default Send host is provided by @timvisee (info). Please consider to donate and help keep it running.

ffsend

Easily and securely share files from the command line. A Send client.

Easily and securely share files and directories from the command line through a safe, private and encrypted link using a single simple command. Files are shared using the Send service and may be up to 1GB. Others are able to download these files with this tool, or through their web browser.

ffsend usage demo
No demo visible here? View it on asciinema.

All files are always encrypted on the client, and secrets are never shared with the remote host. An optional password may be specified, and a default file lifetime of 1 (up to 20) download or 24 hours is enforced to ensure your stuff does not remain online forever. This provides a secure platform to share your files. Find out more about security here.

The public Send service that is used as default host is provided by @timvisee (info).
This application is not affiliated with Firefox or Mozilla in any way.

Note: this tool is currently in beta, as some extra desired features are yet to be implemented

Features

  • Fully featured and friendly command line tool
  • Upload and download files and directories securely, always encrypted on the client
  • Additional password protection, generation and configurable download limits
  • File and directory archiving and extraction
  • Built-in share URL shortener and QR code generator
  • Supports Send v3 (current) and v2
  • History tracking your files for easy management
  • Ability to use your own Send hosts
  • Inspect or delete shared files
  • Accurate error reporting
  • Streaming encryption and uploading/downloading, very low memory footprint
  • Intended for use in scripts without interaction

For a list of upcoming features and ideas, take a look at the current open issues over on GitLab.

Usage

Easily upload and download:

# Simple upload
$ ffsend upload my-file.txt
https://send.vis.ee/#sample-share-url

# Advanced upload
# - Specify a download limit of 1
# - Specify upload expiry time of 5 minutes
# - Enter a password to encrypt the file
# - Archive the file before uploading
# - Copy the shareable link to your clipboard
# - Open the shareable link in your browser
$ ffsend upload --downloads 1 --expiry-time 5m --password --archive --copy --open my-file.txt
Password: ******
https://send.vis.ee/#sample-share-url

# Upload to your own host
$ ffsend u -h https://example.com/ my-file.txt
https://example.com/#sample-share-url

# Simple download
$ ffsend download https://send.vis.ee/#sample-share-url

Inspect remote files:

# Check if a file exists
$ ffsend exists https://send.vis.ee/#sample-share-url
Exists: yes

# Fetch remote file info
$ ffsend info https://send.vis.ee/#sample-share-url
ID:         b087066715
Name:       my-file.txt
Size:       12 KiB
MIME:       text/plain
Downloads:  0 of 10
Expiry:     18h2m (64928s)

Other commands include:

# View your file history
$ ffsend history
#  LINK                                        EXPIRE
1  https://send.vis.ee/#sample-share-url  23h57m
2  https://send.vis.ee/#other-sample-url  17h38m
3  https://example.com/#sample-share-url       37m30s

# Change the password after uploading
$ ffsend password https://send.vis.ee/#sample-share-url
Password: ******

# Delete a file
$ ffsend delete https://send.vis.ee/#sample-share-url

Use the --help flag, help subcommand, or see the help section for all available subcommands.

Requirements

  • Linux, macOS, Windows, FreeBSD, Android (other BSDs might work)
  • A terminal 😎
  • Internet connection
  • Linux:
    • OpenSSL & CA certificates:
      • Ubuntu, Debian and derivatives: apt install openssl ca-certificates
    • Optional: xclip or xsel for clipboard support
      • Ubuntu, Debian and derivatives: apt install xclip
      • CentOS/Red Hat/openSUSE/Fedora: yum install xclip
      • Arch: pacman -S xclip
  • Windows specific:
    • Optional OpenSSL with crypto-openssl feature: » Installer (v1.1.0j or above)
  • macOS specific:
  • FreeBSD specific:
    • OpenSSL: pkg install openssl
    • CA certificates: pkg install ca_root_nss
    • Optional xclip & xsel for clipboard support: pkg install xclip xsel-conrad
  • Android specific:

Install

Because ffsend is still in early stages, only limited installation options are available right now. Feel free to contribute additional packages.

Make sure you meet and install the requirements.

See the operating system specific instructions below:

Linux (all distributions)

Using the snap package is recommended if supported.
Alternatively you may install it manually using the prebuilt binaries.

Only 64-bit (x86_64) packages and binaries are provided. For other architectures and configurations you may compile from source.

More packages options will be coming soon.

Linux: snap package

Note: The ffsend snap package is isolated, and can only access files in your home directory. Choose a different installation option if you don't want this limitation.

Note: due to how snap is configured by default, you won't be able to use the package from some contexts such as through SSH without manual modifications. If you're experiencing problems, please refer to a different installation method such as the prebuilt binaries, or open an issue.

» ffsend

snap install ffsend
ffsend --help

Linux: Arch AUR packages

» ffsend-bin (precompiled binary, latest release, recommended)
» ffsend (compiles from source, latest release)
» ffsend-git (compiles from source, latest master commit)

yay -S ffsend
# or
aurto add ffsend-bin
sudo pacman -S ffsend-bin
# or using any other AUR helper

ffsend --help

Linux: Nix package

Note: The Nix package is currently not automatically updated, and might be slightly outdated.

» ffsend

nix-channel --update
nix-env --install ffsend

ffsend --help

Linux: Fedora package

Note: The Fedora package is maintained by contributors, and might be slightly outdated.

» ffsend

sudo dnf install ffsend

ffsend --help

Linux: Alpine package

Note: The Alpine package is maintained by contributors, it might be outdated. Choose a different installation method if an important update is missing.

» ffsend

apk add ffsend --repository=http://dl-cdn.alpinelinux.org/alpine/edge/testing

ffsend --help

Linux: Prebuilt binaries

Check out the latest release assets for Linux binaries.
Use the ffsend-v*-linux-x64-static binary, to minimize the chance for issues. If it isn't available yet, you may use an artifact from a previous version instead, until it is available.

Make sure you meet and install the requirements before you continue.

You must make the binary executable, and may want to move it into /usr/bin to make it easily executable:

# Rename binary to ffsend
mv ./ffsend-* ./ffsend

# Mark binary as executable
chmod a+x ./ffsend

# Move binary into path, to make it easily usable
sudo mv ./ffsend /usr/local/bin/

ffsend --help

macOS

Using the homebrew package is recommended.
Alternatively you may install it via MacPorts, or manually using the prebuilt binaries.

macOS: homebrew package

Make sure you've homebrew installed, and run:

brew install ffsend
ffsend --help

macOS: MacPorts

Note: ffsend in MacPorts is currently not automatically updated, and might be slightly outdated.

Once you have MacPorts installed, you can run:

sudo port selfupdate
sudo port install ffsend

macOS: Nix package

Note: The Nix package is currently not automatically updated, and might be slightly outdated.

nix-channel --update
nix-env --install ffsend

ffsend --help

macOS: Prebuilt binaries

Check out the latest release assets for a macOS binary. If it isn't available yet, you may use an artifact from a previous version instead, until it is available.

Then, mark the downloaded binary as an executable. You then may want to move it into /usr/local/bin/ to make the ffsend command globally available:

# Rename file to ffsend
mv ./ffsend-* ./ffsend

# Mark binary as executable
chmod a+x ./ffsend

# Move binary into path, to make it easily usable
sudo mv ./ffsend /usr/local/bin/

ffsend

Windows

Using the scoop package is recommended.
Alternatively you may install it manually using the prebuilt binaries.

If you're using the Windows Subsystem for Linux, it's highly recommended to install the prebuilt Linux binary instead.

Only 64-bit (x86_64) binaries are provided. For other architectures and configurations you may compile from source.

A chocolatey package along with an .msi installer will be coming soon.

Windows: scoop package

Make sure you've scoop installed, and run:

scoop install ffsend
ffsend --help

Windows: Prebuilt binaries

Check out the latest release assets for Windows binaries. Use the ffsend-v*-windows-x64-static binary, to minimize the chance for issues. If it isn't available yet, you may use an artifact from a previous version instead, until it is available.

You can use ffsend from the command line in the same directory:

.\ffsend.exe --help

To make it globally invokable as ffsend, you must make the binary available in your systems PATH. The easiest solution is to move it into System32:

move .\ffsend.exe C:\Windows\System32\ffsend.exe

FreeBSD

» ffsend

Note: The FreeBSD package is currently maintained by FreeBSD contributors, and might be slightly outdated.

# Precompiled binary.
pkg install ffsend

# Compiles and installs from source.
cd /usr/ports/www/ffsend && make install

Android

ffsend can be used on Android through Termux, install it first: » Termux

Note: The Android package is currently maintained by Termux contributors, and might be slightly outdated.

# Install package.
pkg install ffsend

ffsend help

Other OS or architecture

If your system runs Docker, you can use the docker image. There are currently no other binaries or packages available.

You can build the project from source instead.

Docker image

A Docker image is available for using ffsend running in a container. Mount a directory to /data, so it's accessible for ffsend in the container, and use the command as you normally would.

» timvisee/ffsend

# Invoke without arguments
docker run --rm -it -v $(pwd):/data timvisee/ffsend

# Upload my-file.txt
docker run --rm -it -v $(pwd):/data timvisee/ffsend upload my-file.txt

# Download from specified link
docker run --rm -it -v $(pwd):/data timvisee/ffsend download https://send.vis.ee/#sample-share-url

# Show help
docker run --rm -it -v $(pwd):/data timvisee/ffsend help

# To update the used image
docker pull timvisee/ffsend

On Linux or macOS you might define a alias in your shell configuration, to make it invokable as ffsend:

alias ffsend='docker run --rm -it -v "$(pwd):/data" timvisee/ffsend'

Note: This implementation is limited to accessing the paths you make available through the specified mount.

Build

To build and install ffsend yourself, you meet the following requirements before proceeding:

Build requirements

  • Runtime requirements
  • git
  • rust v1.40 or higher (install using rustup)
  • OpenSSL or LibreSSL libraries/headers:
    • Linux:
      • Ubuntu, Debian and derivatives: apt install build-essential cmake pkg-config libssl-dev
      • CentOS/Red Hat/openSUSE: yum install gcc gcc-c++ make cmake openssl-devel
      • Arch: pacman -S openssl base-devel
      • Gentoo: emerge -a dev-util/pkgconfig dev-util/cmake dev-libs/openssl
      • Fedora: dnf install gcc gcc-c++ make cmake openssl-devel
      • Or see instructions here
    • Windows:
      • Optional with crypto-openssl feature: See instructions here here
    • macOS:
      • Optional with crypto-openssl feature: brew install cmake pkg-config openssl or see instructions here
    • FreeBSD:
      • pkg install rust gmake pkgconf python36 libxcb xclip ca_root_nss xsel-conrad
      • It is a better idea to use & modify the existing ffsend port, which manages dependencies for you.

Compile and install

Then, walk through one of the following steps to compile and install ffsend:

  • Compile and install it directly from cargo:

    # Compile and install from cargo
    cargo install ffsend -f
    
    # Start using ffsend
    ffsend --help
  • Or clone the repository and install it with cargo:

    # Clone the project
    git clone https://github.com/timvisee/ffsend.git
    cd ffsend
    
    # Compile and install
    cargo install --path . -f
    
    # Start using ffsend
    ffsend --help
    
    # or run it directly from cargo
    cargo run --release -- --help
  • Or clone the repository and invoke the binary directly (Linux/macOS):

    # Clone the project
    git clone https://github.com/timvisee/ffsend.git
    cd ffsend
    
    # Build the project (release version)
    cargo build --release
    
    # Start using ffsend
    ./target/release/ffsend --help

Compile features / use flags

Different use flags are available for ffsend to toggle whether to include various features. The following features are available, some of which are enabled by default:

Feature Enabled Description
send2 Default Support for Send v2 servers
send3 Default Support for Send v3 servers
crypto-ring Default Use ring as cryptography backend
crypto-openssl Use OpenSSL as cryptography backend
clipboard Default Support for copying links to the clipboard
history Default Support for tracking files in history
archive Default Support for archiving and extracting uploads and downloads
qrcode Default Support for rendering a QR code for a share URL
urlshorten Default Support for shortening share URLs
infer-command Default Support for inferring subcommand based on binary name
no-color Compile without color support in error and help messages

To enable features during building or installation, specify them with --features when using cargo. You may want to disable default features first using --no-default-features. Here are some examples:

# Defaults set of features with no-color, one of
cargo install --features no-color
cargo build --release --features no-color

# No default features, except required
cargo install --no-default-features --features send3,crypto-ring

# With history and clipboard support
cargo install --no-default--features --features send3,crypto-ring,history,clipboard

For Windows systems it is recommended to provide the no-color flag, as color support in Windows terminals is flaky.

Configuration and environment

The following environment variables may be used to configure the following defaults. The CLI flag is shown along with it, to better describe the relation to command line arguments:

Variable CLI flag Description
FFSEND_HISTORY --history History file path
FFSEND_HOST --host Upload host
FFSEND_TIMEOUT --timeout Request timeout (0 to disable)
FFSEND_TRANSFER_TIMEOUT --transfer-timeout Transfer timeout (0 to disable)
FFSEND_EXPIRY_TIME --expiry-time Default upload expiry time
FFSEND_DOWNLOAD_LIMIT --download-limit Default download limit
FFSEND_API --api Server API version, - to lookup
FFSEND_BASIC_AUTH --basic-auth Basic HTTP authentication credentials to use.

These environment variables may be used to toggle a flag, simply by making them available. The actual value of these variables is ignored, and variables may be empty.

Variable CLI flag Description
FFSEND_FORCE --force Force operations
FFSEND_NO_INTERACT --no-interact No interaction for prompts
FFSEND_YES --yes Assume yes for prompts
FFSEND_INCOGNITO --incognito Incognito mode, don't use history
FFSEND_OPEN --open Open share link of uploaded file
FFSEND_ARCHIVE --archive Archive files uploaded
FFSEND_EXTRACT --extract Extract files downloaded
FFSEND_COPY --copy Copy share link to clipboard
FFSEND_COPY_CMD --copy-cmd Copy download command to clipboard
FFSEND_QUIET --quiet Log quiet information
FFSEND_VERBOSE --verbose Log verbose information

Some environment variables may be set at compile time to tweak some defaults.

Variable Description
XCLIP_PATH Set fixed xclip binary path when using clipboard-bin (Linux, *BSD)
XSEL_PATH Set fixed xsel binary path when using clipboard-bin (Linux, *BSD)

At this time, no configuration or dotfile file support is available. This will be something added in a later release.

Binary for each subcommand: ffput, ffget

ffsend supports having a separate binaries for single subcommands, such as having ffput and ffget just for to upload and download using ffsend. This allows simple and direct commands like:

ffput my-file.txt
ffget https://send.vis.ee/#sample-share-url

This works for a predefined list of binary names:

  • ffputffsend upload ...
  • ffgetffsend download ...
  • ffdelffsend delete ...
  • This list is defined in src/config.rs as INFER_COMMANDS

You can use the following methods to set up these single-command binaries:

  • Create a properly named symbolic link (recommended)
  • Create a properly named hard link
  • Clone the ffsend binary, and rename it

On Linux and macOS you can use the following command to set up symbolic links in the current directory:

ln -s $(which ffsend) ./ffput
ln -s $(which ffsend) ./ffget

Support for this feature is only available when ffsend is compiled with the infer-command feature flag. This is usually enabled by default. To verify support is available with an existing installation, make sure the feature is listed when invoking ffsend debug.

Note that the snap package does currently not support this due to how this package format works.

Scriptability

ffsend is optimized for use in automated scripts. It provides some specialized arguments to control ffsend without user interaction.

  • --no-interact (-I): do not allow user interaction. For prompts not having a default value, the application will quit with an error, unless --yes or --force is provided. This should always be given when using automated scripting.
    Example: when uploading a directory, providing this flag will stop the archive question prompt form popping up, and will archive the directory as default option.
  • --yes (-y): assume the yes option for yes/no prompt by default.
    Example: when downloading a file that already exists, providing this flag will assume yes when asking to overwrite a file.
  • --force (-f): force to continue with the action, skips any warnings that would otherwise quit the application.
    Example: when uploading a file that is too big, providing this flag will ignore the file size warning and forcefully continues.
  • --quiet (-q): be quiet, print as little information as possible.
    Example: when uploading a file, providing this flag will only output the final share URL.

Generally speaking, use the following rules when automating:

  • Always provide --no-interact (-I).
  • Provide any combination of --yes (-y) and --force (-f) for actions you want to complete no matter what.
  • When passing share URLs along, provide the --quiet (-q) flag, when uploading for example.

These flags can also automatically be set by defining environment variables as specified here:
» Configuration and environment

Here are some examples commands in bash:

# Stop on error
set -e

# Upload a file
# -I: no interaction
# -y: assume yes
# -q: quiet output, just return the share link
URL=$(ffsend -Iy upload -q my-file.txt)

# Render file information
# -I: no interaction
# -f: force, just show the info
ffsend -If info $URL

# Set a password for the uploaded file
ffsend -I password $URL --password="secret"

# Use the following flags automatically from now on
# -I: no interaction
# -f: force
# -y: yes
export FFSEND_NO_INTERACT=1 FFSEND_FORCE=1 FFSEND_YES=1

# Download the uploaded file, overwriting the local variant due to variables
ffsend download $URL --password="secret"

For more information on these arguments, invoke ffsend help and check out: » Configuration and environment

For other questions regarding automation or feature requests, be sure to open an issue.

Security

In short; the ffsend tool and the Send service can be considered secure, and may be used to share sensitive files. Note though that the created share link for an upload will allow anyone to download the file. Make sure you don't share this link with unauthorized people.

For more detailed information on encryption, please read the rest of the paragraphs in this security section.

Note: even though the encryption method is considered secure, this ffsend tool does not provide any warranty in any way, shape or form for files that somehow got decrypted without proper authorization.

Client side encryption

ffsend uses client side encryption, to ensure your files are securely encrypted before they are uploaded to the remote host. This makes it impossible for third parties to decrypt your file without having the secret (encryption key). The file and its metadata are encrypted using 128-bit AES-GCM, and a HMAC SHA-256 signing key is used for request authentication. This is consistent with the encryption documentation provided by the Send service, ffsend is a tool for.

A detailed list on the encryption/decryption steps, and on what encryption is exactly used can be found here in the official service documentation.

Note on share link security

The encryption secret, that is used to decrypt the file when downloading, is included in the share URL behind the # (hash). This secret is never sent the remote server directly when using the share link in your browser. It would be possible however for a webpage to load some malicious JavaScript snippet that eventually steals the secret from the link once the page is loaded. Although this scenario is extremely unlikely, there are some options to prevent this from happening:

  • Only use this ffsend tool, do not use the share link in your browser.
  • Add additional protection by specifying a password using --password while uploading, or using the password subcommand afterwards.
  • Host a secure Send service instance yourself.

A complete overview on encryption can be found in the official service documentation here.

Help

$ ffsend help

ffsend 0.2.72
Tim Visee <[email protected]>
Easily and securely share files from the command line.
A fully featured Send client.

The default public Send host is provided by Tim Visee, @timvisee.
Please consider to donate and help keep it running: https://vis.ee/donate

USAGE:
    ffsend [FLAGS] [OPTIONS] [SUBCOMMAND]

FLAGS:
    -f, --force          Force the action, ignore warnings
    -h, --help           Prints help information
    -i, --incognito      Don't update local history for actions
    -I, --no-interact    Not interactive, do not prompt
    -q, --quiet          Produce output suitable for logging and automation
    -V, --version        Prints version information
    -v, --verbose        Enable verbose information and logging
    -y, --yes            Assume yes for prompts

OPTIONS:
    -A, --api 
   
                     Server API version to use, '-' to lookup [env: FFSEND_API]
        --basic-auth 
    
         Protected proxy HTTP basic authentication credentials (not FxA) [env: FFSEND_BASIC_AUTH]
    -H, --history 
     
                      Use the specified history file [env: FFSEND_HISTORY]
    -t, --timeout 
      
                    Request timeout (0 to disable) [env: FFSEND_TIMEOUT]
    -T, --transfer-timeout 
       
         Transfer timeout (0 to disable) [env: FFSEND_TRANSFER_TIMEOUT] SUBCOMMANDS: upload Upload files [aliases: u, up] download Download files [aliases: d, down] debug View debug information [aliases: dbg] delete Delete a shared file [aliases: del, rm] exists Check whether a remote file exists [aliases: e] generate Generate assets [aliases: gen] help Prints this message or the help of the given subcommand(s) history View file history [aliases: h] info Fetch info about a shared file [aliases: i] parameters Change parameters of a shared file [aliases: params] password Change the password of a shared file [aliases: pass, p] version Determine the Send server version [aliases: v] This application is not affiliated with Firefox or Mozilla. 
       
      
     
    
   

Special thanks

  • to all ffsend source/package contributors
  • to Mozilla for building the amazing Firefox Send service (fork)
  • to everyone involved with asciinema and svg-term for providing tools to make great visual demos
  • to everyone involved in all crate dependencies used

License

This project is released under the GNU GPL-3.0 license. Check out the LICENSE file for more information.

Comments
  • Upload file from stdin

    Upload file from stdin

    Hello, I'm wondering if you have considered support for reading from stdin or a named pipe to avoid having to write a file to disk. For example, all of the following fail with various errors:

    echo foo | ffsend upload --name foo.txt
    echo foo | ffsend upload --name foo.txt -
    ffsend upload --name foo.txt <(echo foo)
    

    Thanks! Noah

    enhancement 
    opened by nhoffman 13
  • Bug: thread 'main' panicked at 'failed to read header' on Ubuntu 16.04 Xenial

    Bug: thread 'main' panicked at 'failed to read header' on Ubuntu 16.04 Xenial

    hello thanks for you jobs, i got on ubuntu1604 xenial :

    ./ffsend upload dummy.png

    thread 'main' panicked at 'failed to read header from reader: Custom { kind: UnexpectedEof, error: StringError("failed to fill whole buffer") }', src/libcore/result.rs:997:5 note: Run with RUST_BACKTRACE=1 environment variable to display a backtrace.

    bug 
    opened by VeilleurTrytoFix 11
  • Shorten URLs and render QR codes

    Shorten URLs and render QR codes

    Currently, the download file link generated by this utility is very big and it is very hard to share the link verbally with the person sitting right beside.

    The idea is to add an URL shortener with this utility which can generate a temporary shortened link of the original link based on user input. The shortened link may be flushed after a certain time interval so that it can be reused to share another file later by somebody else.

    enhancement 
    opened by apsknight 9
  • Windows: Failing with missing libssl and libcrypto

    Windows: Failing with missing libssl and libcrypto

    I installed ffsend with scoop and the installation was successful. Trying to use the ffsend u command though is failing with this error:

    The code execution cannot proceed because libssl-1_1-x64.dll was not found. Reinstalling the program may fix this problem.
    

    Followed by,

    The code execution cannot proceed because libcrypto-1_1-x64.dll was not found. Reinstalling the program may fix this problem.
    

    I tried removing ffsend and installing it afresh, but that did not help. Should I install these packages/libraries manually, or is it something that ffsend installation should take care of?

    bug dependencies 
    opened by arunsathiya 8
  • "path is not an existing file" when using snap package

    I installed the snap on the current Ubuntu LTS and get the following error message when I try uploading a file:

    $ ffsend upload test.org
    error: failed to check the file size, ignoring
    error: failed to upload the specified file
    caused by: the given path is not an existing file
    
    For detailed errors try '--verbose'
    For more information try '--help'
    

    The file definitely exists. Also, adding --verbose doesn't produce additional information. I'm probably missing something obvious?

    opened by tmalsburg 8
  • HTTP Authentication

    HTTP Authentication

    Dear Tim Visée,

    thank you very much for developing ffsend!

    I use it with send.firefox.com and now want to use it with my own server.

    My server is behind a reverse proxy. All services behind that are protected from abuse by HTTP basic authentication (plus TLS).

    I would be really grateful if ffsend could send/use HTTP basic auth credentials.

    Probably the underlying rust library already implements this, it would be really nice if this could be exposed to the command line (and perhaps some ENVIRONMENT variable).

    Hopefully not coming across as some lazy freeloader i would be grateful if this feature could be implemented, i might not be the only user of this :)

    kind regards.

    opened by GHQB 7
  • Feature: Automatically generate random password/passphrase

    Feature: Automatically generate random password/passphrase

    Hi, great project!

    I would love to see a feature added, that gives the user the option of either specifying a password for the file, or having ffsend generate one automatically. I think a 32 byte long random password would be nice for this. It could also be a passphrase instead, which would make them easier to share if this cannot be done per copy-paste and the receiving user has to manually type the password.

    enhancement 
    opened by brycx 7
  • OpenSSL download link is down

    OpenSSL download link is down

    This link is down xD. https://slproweb.com/download/Win64OpenSSL_Light-1_1_0j.exe. I found different link here: https://bintray.com/vszakats/generic/openssl

    opened by theblackturtle 6
  • Uploading multiple files at once fails if an archive name is not specified

    Uploading multiple files at once fails if an archive name is not specified

    When trying to upload several files in one command, ffsend offers to archive them and upload the resulting archive. However, this will fail if --name is not specified:

    $ ffsend upload file1 file2
    You've selected multiple files, only a single file may be uploaded.
    Archive the files into a single file? [Y/n]: y
    Archiving...
    error: you must specify a file name for the archive
    
    Use '--name ' to specify a file name
    For more information try '--help'
    
    opened by andreipoe 5
  • Multiple binaries for easier usage?

    Multiple binaries for easier usage?

    This may be a personal thing, but I would prefer:

    ffsend [OPTIONS] FILE # Uploads a given file
    ffget [OPTIONS] URL # Downloads from a URL
    

    to the current interface. Is this something the project would be open to?

    enhancement 
    opened by NoraCodes 5
  • I seem to be quite stupid... Sorry...

    I seem to be quite stupid... Sorry...

    I am currently trying to install ffsend (thank you very much for making it) on android using termux. I inputted the command pkg install ffsend, but termux does not appear to be able to find the package and displays $ pkg install ffsend Checking availability of current mirror: ok Reading package lists... Done Building dependency tree Reading state information... Done E: Unable to locate package ffsend

    Which is why I am now in need of assistance.

    opened by raphaelritz 4
  • Bump prettytable-rs from 0.8.0 to 0.10.0

    Bump prettytable-rs from 0.8.0 to 0.10.0

    Bumps prettytable-rs from 0.8.0 to 0.10.0.

    Release notes

    Sourced from prettytable-rs's releases.

    v0.10.0

    Fixed

    • Fix panic due to incorrect ANSI escape handling #137
    • Fix display of empty tables #127

    Changed

    • Remove the unsafe code in Table::as_ref #146
    • Switch atty to is-terminal #151
    • Minimal Supported Rust Version bumped to 1.56

    Thanks

    v0.9.0

    This release has been updated with latest dependencies versions.

    This crate has been abandonned without notice for quite a while due to some personnal reasons. My apologies for that. I'll try to do my best to continue to maintain it, at least for security updates. If I can't the find time to do it, I'll have no other option than deprecating it, or find new contributors to handover the maintenance to. Feel free to raise your hand if you're interrested. In the meantime, please expect a low update rate, and again please accept my apologies.

    I'll do a pass on opened PRs after summer vacations.

    Changelog

    Sourced from prettytable-rs's changelog.

    0.10.0 (2022-12-27)

    Fixed

    • Fix panic due to incorrect ANSI escape handling (#137)
    • Fix display of empty tables (#127)

    Changed

    • Remove the unsafe code in Table::as_ref (#146)
    • Switch atty to is-terminal (#151)
    • Minimal Supported Rust Version bumped to 1.56

    Thanks

    #127: phsym/prettytable-rs#127 #137: phsym/prettytable-rs#137 #145: phsym/prettytable-rs#145 #146: phsym/prettytable-rs#146 #151: phsym/prettytable-rs#151

    Commits

    Dependabot compatibility score

    Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


    Dependabot commands and options

    You can trigger Dependabot actions by commenting on this PR:

    • @dependabot rebase will rebase this PR
    • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
    • @dependabot merge will merge this PR after your CI passes on it
    • @dependabot squash and merge will squash and merge this PR after your CI passes on it
    • @dependabot cancel merge will cancel a previously requested merge and block automerging
    • @dependabot reopen will reopen this PR if it is closed
    • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
    • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
    • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
    • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
    • @dependabot use these labels will set the current labels as the default for future PRs for this repo and language
    • @dependabot use these reviewers will set the current reviewers as the default for future PRs for this repo and language
    • @dependabot use these assignees will set the current assignees as the default for future PRs for this repo and language
    • @dependabot use this milestone will set the current milestone as the default for future PRs for this repo and language

    You can disable automated security fix PRs for this repo from the Security Alerts page.

    dependencies 
    opened by dependabot[bot] 0
  • the file size is bigger than the maximum allowed

    the file size is bigger than the maximum allowed

    Hey, I would like to share a file through my send server. I get this message: error: the file size is 8.24 GiB, bigger than the maximum allowed of 2.50 GiB But my send server allows 15 GiB. Is that a client limit?

    Command i used: ffsend u -h https://example.com -p 1234 -d 2 -e 1d 'example.file'

    System: Ubuntu 20.04 Server

    Thanks for help.

    opened by Skyfay 0
  • No binaries for windows in release

    No binaries for windows in release

    Says in README Check out the [latest release](https://github.com/timvisee/ffsend/releases/latest) assets for Windows binaries. but there is only linux binary.

    https://github.com/timvisee/ffsend/releases/tag/v0.2.76

    opened by thisismygitrepo 0
  • Feture Request: Unencrypted mode

    Feture Request: Unencrypted mode

    Hi I am a Tor Browser user and I find it very likely to collapse or fail when encrypting in browser for large files. There is also a size limit that Tor Browser can decrypt(a few hundred MB). I never trust front-end encryption anyway. I always encrypt locally myself. I think it would good to introduce a no-javascript unencrypted mode to serve all user's needs. Thank you!

    opened by Che15ea 4
  • Feature request: libssl3 support

    Feature request: libssl3 support

    The non-static binary builds on Ubuntu 22.04 yield this:

    ffsend: error while loading shared libraries: libssl.so.1.1: cannot open shared object file: No such file or directory

    Of course as a workaround I can use the static version, but perhaps it would be nice to have a libssl3 compatible version in the future :-)

    opened by rgpublic 1
  • Easy Way to update Prebuilt binary in Path?

    Easy Way to update Prebuilt binary in Path?

    Something along the lines of how yt-dlp updates itself with the "yt-dlp -U" command would be a great way to keep this application updated on any distro.

    If something like that is possible, please make it happen.

    enhancement 
    opened by Pentaphon 2
Releases(v0.2.76)
Owner
Tim Visée
On GitLab: https://gitlab.com/timvisee
Tim Visée
A fully-featured lexer generator, implement as a proc macro

lexgen: A fully-featured lexer generator, implemented as a proc macro lexer! { // First line specifies name of the lexer and the token type return

Ömer Sinan Ağacan 43 Nov 19, 2022
A simple command-line application to securely store secrets using encryption

rust-secret-vault A simple yet robust command-line tool designed to safely encrypt and store your sensitive information. Harnessing the power of AES-2

Luis Soares 4 Nov 22, 2023
A terminal-based password manager, generator, and importer/exporter (Firefox, Chrome) backed with a concurrent hashmap

rucksack A terminal-based password manager, generator, and importer/exporter (Firefox, Chrome) backed with a concurrent hashmap Features Password gene

null 6 Jan 18, 2023
Rust client library for Flashbots MEV-Share

Flashbots MEV-Share Client   Rust client library for Flashbots MEV-Share. Based on the MEV-Share specs and the TypeScript reference implementation. Us

null 4 Aug 22, 2023
Narrowlink securely connects devices and services together, even when both nodes are behind separate NAT

Narrowlink Narrowlink is a self-hosted platform that allows you to establish secure remote connections between devices within a network that may be hi

Narrowlink 355 Aug 17, 2023
🧩Creating a blockchain wallet and integrating a couple of cryptographic algorithms to securely save the secrets.🧩

Rust Library For Cryptocurrency Wallet Folder Structure src : contains the source code of the library examples : contains some examples of the library

rstkey 3 Aug 12, 2024
A blazingly fast, ShareX uploader coded in Rust (using actix web) which utilizes AES-256-GCM-SIV to securely store uploaded content.

Magnesium Oxide ❔ What is this? Magnesium-Oxide (MGO) is a secure file uploader with support for ShareX. ?? Features ?? Blazingly fast uploads and enc

Nitrogen Development 26 Nov 25, 2022
Tool to retrieve mev-share events data and scan for refunds onchain

MEV-Share Analysis This repository can be used to retrieve historical events sent to mev-share and scan for any refunds that were sent to the users. T

Yash Atreya 7 Nov 30, 2023
RGB smart contracts: client-facing library & command-line for desktop and mobile

RGB smart contracts RGB is confidential & scalable client-validated smart contracts for Bitcoin & Lightning. It embraces the concepts of private & mut

RGB: scalable & private smart contracts for bitcoin & lightning 4 Mar 15, 2023
A fully p2p cli chat utility written in rust.

P2P Chat Client This is a simple demonstration of a peer to peer chat client, written entirely in rust utilising the libp2p library. Demo On two seper

Josiah Bull 7 Dec 17, 2022
Fiddi is a command line tool that does the boring and complex process of checking and processing/watching transactions on EVM compatible Blockchain.

Fiddi is a command line tool that does the boring and complex process of checking and processing/watching transactions on EVM compatible Blockchain.

Ahmad Abdullahi Adamu 7 Jan 9, 2023
A simple and secure rust command-line tool to protect your text by encrypting and decrypting it using the robust AES-256 algorithm.

Secret Keeper A simple and secure command-line tool to protect your text by encrypting and decrypting it using the robust AES-256 algorithm. Built wit

Kunal Bagaria 9 May 11, 2023
Starknet Stack let's you easily create new Cairo Starknet chains with their own sequencers, provers and verifiers

Starknet Stack flowchart LR A("Client") ==>|"Starknet Transactions"| subGraph0["Sequencer"] subGraph0 -.->|"Blocks with txs"| 300319["Watcher prover

Lambdaclass 7 Jul 11, 2023
Lockbox is a command-line tool for generating and managing passwords

Lockbox is a command-line tool for generating and managing passwords. It uses strong encryption algorithms to securely store your passwords, so you can be sure that your data is safe.

Sonu Bardai 15 Oct 9, 2023
An easily deployable service to monitor mission-critical SPL token accounts

Vault watcher Monitoring critical spl-token accounts in real time Table of contents Introduction Usage Configuration Configuration examples Grafana In

null 21 Nov 29, 2022
Koofr Vault is an open-source, client-side encrypted folder for your Koofr cloud storage offering an extra layer of security for your most sensitive files.

Koofr Vault https://vault.koofr.net Koofr Vault is an open-source, client-side encrypted folder for your Koofr cloud storage offering an extra layer o

Koofr 12 Dec 30, 2022
Cardano Command Line Interface (CLI) (Deprecated)

Deprecated Note: This repository implements supports for Cardano Byron, and will not be updated to works on Cardano Shelley and further. cardano-cli T

Input Output 87 Oct 9, 2022
Trustworthy encrypted command line authenticator app compatible with multiple backups.

cotp - command line totp authenticator I believe that security is of paramount importance, especially in this digital world. I created cotp because I

Reply 71 Dec 30, 2022
Rust command line program for Bitcoin brainwallet

brainwallet Rust command line program for Bitcoin brainwallet as implemented at https://www.bitaddress.org. To run it, first install Rust, e.g. from h

Frank Buss 3 Dec 30, 2021