GNU Wget 1.11.4: by Hrvoje Nik Si C and Others
GNU Wget 1.11.4: by Hrvoje Nik Si C and Others
GNU Wget 1.11.4: by Hrvoje Nik Si C and Others
4
The non-interactive download utility
Updated for Wget 1.11.4, May 2008
Table of Contents
1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
2 Invoking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
2.1 URL Format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
2.2 Option Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
2.3 Basic Startup Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
2.4 Logging and Input File Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
2.5 Download Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
2.6 Directory Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
2.7 HTTP Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
2.8 HTTPS (SSL/TLS) Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
2.9 FTP Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
2.10 Recursive Retrieval Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
2.11 Recursive Accept/Reject Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
3 Recursive Download . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
4 Following Links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
4.1 Spanning Hosts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
4.2 Types of Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
4.3 Directory-Based Limits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
4.4 Relative Links. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
4.5 Following FTP Links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
5 Time-Stamping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
5.1 Time-Stamping Usage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
5.2 HTTP Time-Stamping Internals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
5.3 FTP Time-Stamping Internals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
6 Startup File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
6.1 Wgetrc Location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
6.2 Wgetrc Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
6.3 Wgetrc Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
6.4 Sample Wgetrc . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
7 Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
7.1 Simple Usage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
7.2 Advanced Usage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
7.3 Very Advanced Usage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
ii
8 Various . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
8.1 Proxies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
8.2 Distribution. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
8.3 Web Site . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
8.4 Mailing List. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
8.5 Internet Relay Chat . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
8.6 Reporting Bugs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
8.7 Portability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
8.8 Signals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
9 Appendices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
9.1 Robot Exclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
9.2 Security Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
9.3 Contributors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Concept Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58
Chapter 1: Overview 1
1 Overview
GNU Wget is a free utility for non-interactive download of files from the Web. It supports http,
https, and ftp protocols, as well as retrieval through http proxies.
This chapter is a partial overview of Wget’s features.
• Wget is non-interactive, meaning that it can work in the background, while the user is not
logged on. This allows you to start a retrieval and disconnect from the system, letting Wget
finish the work. By contrast, most of the Web browsers require constant user’s presence,
which can be a great hindrance when transferring a lot of data.
• Wget can follow links in html and xhtml pages and create local versions of remote web
sites, fully recreating the directory structure of the original site. This is sometimes referred
to as “recursive downloading.” While doing that, Wget respects the Robot Exclusion
Standard (‘/robots.txt’). Wget can be instructed to convert the links in downloaded
html files to the local files for offline viewing.
• File name wildcard matching and recursive mirroring of directories are available when re-
trieving via ftp. Wget can read the time-stamp information given by both http and ftp
servers, and store it locally. Thus Wget can see if the remote file has changed since last
retrieval, and automatically retrieve the new version if it has. This makes Wget suitable
for mirroring of ftp sites, as well as home pages.
• Wget has been designed for robustness over slow or unstable network connections; if a
download fails due to a network problem, it will keep retrying until the whole file has
been retrieved. If the server supports regetting, it will instruct the server to continue the
download from where it left off.
• Wget supports proxy servers, which can lighten the network load, speed up retrieval and
provide access behind firewalls. Wget uses the passive ftp downloading by default, active
ftp being an option.
• Wget supports IP version 6, the next generation of IP. IPv6 is autodetected at compile-time,
and can be disabled at either build or run time. Binaries built with IPv6 support work well
in both IPv4-only and dual family environments.
• Built-in features offer mechanisms to tune which links you wish to follow (see Chapter 4
[Following Links], page 25).
• The progress of individual downloads is traced using a progress gauge. Interactive downloads
are tracked using a “thermometer”-style gauge, whereas non-interactive ones are traced with
dots, each dot representing a fixed amount of data received (1KB by default). Either gauge
can be customized to your preferences.
• Most of the features are fully configurable, either through command line options, or via
the initialization file ‘.wgetrc’ (see Chapter 6 [Startup File], page 31). Wget allows you to
define global startup files (‘/usr/local/etc/wgetrc’ by default) for site settings.
• Finally, GNU Wget is free software. This means that everyone may use it, redistribute it
and/or modify it under the terms of the GNU General Public License, as published by the
Free Software Foundation (see the file ‘COPYING’ that came with GNU Wget, for details).
Chapter 2: Invoking 2
2 Invoking
By default, Wget is very simple to invoke. The basic syntax is:
wget [option ]... [URL ]...
Wget will simply download all the urls specified on the command line. URL is a Uniform
Resource Locator, as defined below.
However, you may wish to change some of the default parameters of Wget. You can do it
two ways: permanently, adding the appropriate command to ‘.wgetrc’ (see Chapter 6 [Startup
File], page 31), or specifying it on the command line.
‘-e command ’
‘--execute command ’
Execute command as if it were a part of ‘.wgetrc’ (see Chapter 6 [Startup File],
page 31). A command thus invoked will be executed after the commands in
‘.wgetrc’, thus taking precedence over them. If you need to specify more than
one wgetrc command, use multiple instances of ‘-e’.
‘-a logfile ’
‘--append-output=logfile ’
Append to logfile. This is the same as ‘-o’, only it appends to logfile instead of
overwriting the old log file. If logfile does not exist, a new file is created.
‘-d’
‘--debug’ Turn on debug output, meaning various information important to the developers of
Wget if it does not work properly. Your system administrator may have chosen to
compile Wget without debug support, in which case ‘-d’ will not work. Please note
that compiling with debug support is always safe—Wget compiled with the debug
support will not print any debug info unless requested with ‘-d’. See Section 8.6
[Reporting Bugs], page 45, for more information on how to use ‘-d’ for sending bug
reports.
‘-q’
‘--quiet’ Turn off Wget’s output.
‘-v’
‘--verbose’
Turn on verbose output, with all the available data. The default output is verbose.
‘-nv’
‘--no-verbose’
Turn off verbose without being completely quiet (use ‘-q’ for that), which means
that error messages and basic information still get printed.
‘-i file ’
‘--input-file=file ’
Read urls from file. If ‘-’ is specified as file, urls are read from the standard input.
(Use ‘./-’ to read from a file literally named ‘-’.)
If this function is used, no urls need be present on the command line. If there are
urls both on the command line and in an input file, those on the command lines
will be the first ones to be retrieved. The file need not be an html document (but
no harm if it is)—it is enough if the urls are just listed sequentially.
However, if you specify ‘--force-html’, the document will be regarded as ‘html’.
In that case you may have problems with relative links, which you can solve either
by adding <base href="url "> to the documents or by specifying ‘--base=url ’ on
the command line.
Chapter 2: Invoking 5
‘-F’
‘--force-html’
When input is read from a file, force it to be treated as an html file. This enables
you to retrieve relative links from existing html files on your local disk, by adding
<base href="url "> to html, or using the ‘--base’ command-line option.
‘-B URL ’
‘--base=URL ’
Prepends URL to relative links read from the file specified with the ‘-i’ option.
copy being named ‘file.1’. If that file is downloaded yet again, the third copy will
be named ‘file.2’, and so on. When ‘-nc’ is specified, this behavior is suppressed,
and Wget will refuse to download newer copies of ‘file ’. Therefore, “no-clobber”
is actually a misnomer in this mode—it’s not clobbering that’s prevented (as the
numeric suffixes were already preventing clobbering), but rather the multiple version
saving that’s prevented.
When running Wget with ‘-r’ or ‘-p’, but without ‘-N’ or ‘-nc’, re-downloading a
file will result in the new copy simply overwriting the old. Adding ‘-nc’ will prevent
this behavior, instead causing the original version to be preserved and any newer
copies on the server to be ignored.
When running Wget with ‘-N’, with or without ‘-r’ or ‘-p’, the decision as to
whether or not to download a newer copy of a file depends on the local and remote
timestamp and size of the file (see Chapter 5 [Time-Stamping], page 29). ‘-nc’ may
not be specified at the same time as ‘-N’.
Note that when ‘-nc’ is specified, files with the suffixes ‘.html’ or ‘.htm’ will be
loaded from the local disk and parsed as if they had been retrieved from the Web.
‘-c’
‘--continue’
Continue getting a partially-downloaded file. This is useful when you want to finish
up a download started by a previous instance of Wget, or by another program. For
instance:
wget -c ftp://sunsite.doc.ic.ac.uk/ls-lR.Z
If there is a file named ‘ls-lR.Z’ in the current directory, Wget will assume that it
is the first portion of the remote file, and will ask the server to continue the retrieval
from an offset equal to the length of the local file.
Note that you don’t need to specify this option if you just want the current invocation
of Wget to retry downloading a file should the connection be lost midway through.
This is the default behavior. ‘-c’ only affects resumption of downloads started prior
to this invocation of Wget, and whose local files are still sitting around.
Without ‘-c’, the previous example would just download the remote file to
‘ls-lR.Z.1’, leaving the truncated ‘ls-lR.Z’ file alone.
Beginning with Wget 1.7, if you use ‘-c’ on a non-empty file, and it turns out that
the server does not support continued downloading, Wget will refuse to start the
download from scratch, which would effectively ruin existing contents. If you really
want the download to start from scratch, remove the file.
Also beginning with Wget 1.7, if you use ‘-c’ on a file which is of equal size as
the one on the server, Wget will refuse to download the file and print an explana-
tory message. The same happens when the file is smaller on the server than lo-
cally (presumably because it was changed on the server since your last download
attempt)—because “continuing” is not meaningful, no download occurs.
On the other side of the coin, while using ‘-c’, any file that’s bigger on the server
than locally will be considered an incomplete download and only (length(remote)
- length(local)) bytes will be downloaded and tacked onto the end of the local
file. This behavior can be desirable in certain cases—for instance, you can use ‘wget
-c’ to download just the new portion that’s been appended to a data collection or
log file.
However, if the file is bigger on the server because it’s been changed, as opposed to
just appended to, you’ll end up with a garbled file. Wget has no way of verifying
that the local file is really a valid prefix of the remote file. You need to be especially
Chapter 2: Invoking 7
careful of this when using ‘-c’ in conjunction with ‘-r’, since every file will be
considered as an "incomplete download" candidate.
Another instance where you’ll get a garbled file if you try to use ‘-c’ is if you have
a lame http proxy that inserts a “transfer interrupted” string into the local file. In
the future a “rollback” option may be added to deal with this case.
Note that ‘-c’ only works with ftp servers and with http servers that support the
Range header.
‘--progress=type ’
Select the type of the progress indicator you wish to use. Legal indicators are “dot”
and “bar”.
The “bar” indicator is used by default. It draws an ascii progress bar graphics
(a.k.a “thermometer” display) indicating the status of retrieval. If the output is not
a TTY, the “dot” bar will be used by default.
Use ‘--progress=dot’ to switch to the “dot” display. It traces the retrieval by
printing dots on the screen, each dot representing a fixed amount of downloaded
data.
When using the dotted retrieval, you may also set the style by specifying the type as
‘dot:style ’. Different styles assign different meaning to one dot. With the default
style each dot represents 1K, there are ten dots in a cluster and 50 dots in a line.
The binary style has a more “computer”-like orientation—8K dots, 16-dots clusters
and 48 dots per line (which makes for 384K lines). The mega style is suitable for
downloading very large files—each dot represents 64K retrieved, there are eight dots
in a cluster, and 48 dots on each line (so each line contains 3M).
Note that you can set the default style using the progress command in ‘.wgetrc’.
That setting may be overridden from the command line. The exception is that,
when the output is not a TTY, the “dot” progress will be favored over “bar”. To
force the bar output, use ‘--progress=bar:force’.
‘-N’
‘--timestamping’
Turn on time-stamping. See Chapter 5 [Time-Stamping], page 29, for details.
‘-S’
‘--server-response’
Print the headers sent by http servers and responses sent by ftp servers.
‘--spider’
When invoked with this option, Wget will behave as a Web spider, which means
that it will not download the pages, just check that they are there. For example,
you can use Wget to check your bookmarks:
wget --spider --force-html -i bookmarks.html
This feature needs much more work for Wget to get close to the functionality of real
web spiders.
‘-T seconds’
‘--timeout=seconds ’
Set the network timeout to seconds seconds. This is equivalent to specifying
‘--dns-timeout’, ‘--connect-timeout’, and ‘--read-timeout’, all at the same
time.
When interacting with the network, Wget can check for timeout and abort the
operation if it takes too long. This prevents anomalies like hanging reads and infinite
connects. The only timeout enabled by default is a 900-second read timeout. Setting
Chapter 2: Invoking 8
a timeout to 0 disables it altogether. Unless you know what you are doing, it is best
not to change the default timeout settings.
All timeout-related options accept decimal values, as well as subsecond values. For
example, ‘0.1’ seconds is a legal (though unwise) choice of timeout. Subsecond
timeouts are useful for checking server response times or for testing network latency.
‘--dns-timeout=seconds ’
Set the DNS lookup timeout to seconds seconds. DNS lookups that don’t complete
within the specified time will fail. By default, there is no timeout on DNS lookups,
other than that implemented by system libraries.
‘--connect-timeout=seconds ’
Set the connect timeout to seconds seconds. TCP connections that take longer to
establish will be aborted. By default, there is no connect timeout, other than that
implemented by system libraries.
‘--read-timeout=seconds ’
Set the read (and write) timeout to seconds seconds. The “time” of this timeout
refers to idle time: if, at any point in the download, no data is received for more
than the specified number of seconds, reading fails and the download is restarted.
This option does not directly affect the duration of the entire download.
Of course, the remote server may choose to terminate the connection sooner than
this option requires. The default read timeout is 900 seconds.
‘--limit-rate=amount ’
Limit the download speed to amount bytes per second. Amount may be expressed
in bytes, kilobytes with the ‘k’ suffix, or megabytes with the ‘m’ suffix. For example,
‘--limit-rate=20k’ will limit the retrieval rate to 20KB/s. This is useful when, for
whatever reason, you don’t want Wget to consume the entire available bandwidth.
This option allows the use of decimal numbers, usually in conjunction with power
suffixes; for example, ‘--limit-rate=2.5k’ is a legal value.
Note that Wget implements the limiting by sleeping the appropriate amount of time
after a network read that took less time than specified by the rate. Eventually this
strategy causes the TCP transfer to slow down to approximately the specified rate.
However, it may take some time for this balance to be achieved, so don’t be surprised
if limiting the rate doesn’t work well with very small files.
‘-w seconds ’
‘--wait=seconds ’
Wait the specified number of seconds between the retrievals. Use of this option is
recommended, as it lightens the server load by making the requests less frequent.
Instead of in seconds, the time can be specified in minutes using the m suffix, in
hours using h suffix, or in days using d suffix.
Specifying a large value for this option is useful if the network or the destination
host is down, so that Wget can wait long enough to reasonably expect the network
error to be fixed before the retry. The waiting interval specified by this function is
influenced by --random-wait, which see.
‘--waitretry=seconds ’
If you don’t want Wget to wait between every retrieval, but only between retries of
failed downloads, you can use this option. Wget will use linear backoff, waiting 1
second after the first failure on a given file, then waiting 2 seconds after the second
failure on that file, up to the maximum number of seconds you specify. Therefore,
a value of 10 will actually make Wget wait up to (1 + 2 + ... + 10) = 55 seconds per
file.
Chapter 2: Invoking 9
Note that this option is turned on by default in the global ‘wgetrc’ file.
‘--random-wait’
Some web sites may perform log analysis to identify retrieval programs such as Wget
by looking for statistically significant similarities in the time between requests. This
option causes the time between requests to vary between 0.5 and 1.5 * wait seconds,
where wait was specified using the ‘--wait’ option, in order to mask Wget’s presence
from such analysis.
A 2001 article in a publication devoted to development on a popular consumer
platform provided code to perform this analysis on the fly. Its author suggested
blocking at the class C address level to ensure automated retrieval programs were
blocked despite changing DHCP-supplied addresses.
The ‘--random-wait’ option was inspired by this ill-advised recommendation to
block many unrelated users from a web site due to the actions of one.
‘--no-proxy’
Don’t use proxies, even if the appropriate *_proxy environment variable is defined.
For more information about the use of proxies with Wget, See Section 8.1 [Proxies],
page 44.
‘-Q quota ’
‘--quota=quota ’
Specify download quota for automatic retrievals. The value can be specified in bytes
(default), kilobytes (with ‘k’ suffix), or megabytes (with ‘m’ suffix).
Note that quota will never affect downloading a single file. So if you specify ‘wget
-Q10k ftp://wuarchive.wustl.edu/ls-lR.gz’, all of the ‘ls-lR.gz’ will be down-
loaded. The same goes even when several urls are specified on the command-line.
However, quota is respected when retrieving either recursively, or from an input file.
Thus you may safely type ‘wget -Q2m -i sites’—download will be aborted when
the quota is exceeded.
Setting quota to 0 or to ‘inf’ unlimits the download quota.
‘--no-dns-cache’
Turn off caching of DNS lookups. Normally, Wget remembers the IP addresses it
looked up from DNS so it doesn’t have to repeatedly contact the DNS server for the
same (typically small) set of hosts it retrieves from. This cache exists in memory
only; a new Wget run will contact DNS again.
However, it has been reported that in some situations it is not desirable to cache host
names, even for the duration of a short-running application like Wget. With this
option Wget issues a new DNS lookup (more precisely, a new call to gethostbyname
or getaddrinfo) each time it makes a new connection. Please note that this option
will not affect caching that might be performed by the resolving library or by an
external caching layer, such as NSCD.
If you don’t understand exactly what this option does, you probably won’t need it.
‘--restrict-file-names=mode ’
Change which characters found in remote URLs may show up in local file names gen-
erated from those URLs. Characters that are restricted by this option are escaped,
i.e. replaced with ‘%HH’, where ‘HH’ is the hexadecimal number that corresponds to
the restricted character.
By default, Wget escapes the characters that are not valid as part of file names on
your operating system, as well as control characters that are typically unprintable.
This option is useful for changing these defaults, either because you are downloading
Chapter 2: Invoking 10
is taken as a sign that the server is not running at all and that retries would not
help. This option is for mirroring unreliable sites whose servers tend to disappear
for short periods of time.
‘--user=user ’
‘--password=password ’
Specify the username user and password password for both ftp and http
file retrieval. These parameters can be overridden using the ‘--ftp-user’ and
‘--ftp-password’ options for ftp connections and the ‘--http-user’ and
‘--http-password’ options for http connections.
some consider them a breach of privacy. The default is to use cookies; however,
storing cookies is not on by default.
‘--load-cookies file ’
Load cookies from file before the first HTTP retrieval. file is a textual file in the
format originally used by Netscape’s ‘cookies.txt’ file.
You will typically use this option when mirroring sites that require that you be
logged in to access some or all of their content. The login process typically works by
the web server issuing an http cookie upon receiving and verifying your credentials.
The cookie is then resent by the browser when accessing that part of the site, and
so proves your identity.
Mirroring such a site requires Wget to send the same cookies your browser sends
when communicating with the site. This is achieved by ‘--load-cookies’—simply
point Wget to the location of the ‘cookies.txt’ file, and it will send the same
cookies your browser would send in the same situation. Different browsers keep
textual cookie files in different locations:
Netscape 4.x.
The cookies are in ‘~/.netscape/cookies.txt’.
Mozilla and Netscape 6.x.
Mozilla’s cookie file is also named ‘cookies.txt’, located somewhere
under ‘~/.mozilla’, in the directory of your profile. The full path
usually ends up looking somewhat like ‘~/.mozilla/default/some-
weird-string /cookies.txt’.
Internet Explorer.
You can produce a cookie file Wget can use by using the File menu,
Import and Export, Export Cookies. This has been tested with Internet
Explorer 5; it is not guaranteed to work with earlier versions.
Other browsers.
If you are using a different browser to create your cookies,
‘--load-cookies’ will only work if you can locate or produce a cookie
file in the Netscape format that Wget expects.
If you cannot use ‘--load-cookies’, there might still be an alternative. If your
browser supports a “cookie manager”, you can use it to view the cookies used when
accessing the site you’re mirroring. Write down the name and value of the cookie,
and manually instruct Wget to send those cookies, bypassing the “official” cookie
support:
wget --no-cookies --header "Cookie: name =value "
‘--save-cookies file ’
Save cookies to file before exiting. This will not save cookies that have ex-
pired or that have no expiry time (so-called “session cookies”), but also see
‘--keep-session-cookies’.
‘--keep-session-cookies’
When specified, causes ‘--save-cookies’ to also save session cookies. Session cook-
ies are normally not saved because they are meant to be kept in memory and for-
gotten when you exit the browser. Saving them is useful on sites that require you
to log in or to visit the home page before you can access some pages. With this
option, multiple Wget runs are considered a single browser session as far as the site
is concerned.
Chapter 2: Invoking 14
Since the cookie file format does not normally carry session cookies, Wget marks
them with an expiry timestamp of 0. Wget’s ‘--load-cookies’ recognizes those
as session cookies, but it might confuse other browsers. Also note that cookies
so loaded will be treated as other session cookies, which means that if you want
‘--save-cookies’ to preserve them again, you must use ‘--keep-session-cookies’
again.
‘--ignore-length’
Unfortunately, some http servers (cgi programs, to be more precise) send out
bogus Content-Length headers, which makes Wget go wild, as it thinks not all the
document was retrieved. You can spot this syndrome if Wget retries getting the
same document again and again, each time claiming that the (otherwise normal)
connection has closed on the very same byte.
With this option, Wget will ignore the Content-Length header—as if it never ex-
isted.
‘--header=header-line ’
Send header-line along with the rest of the headers in each http request. The
supplied header is sent as-is, which means it must contain name and value separated
by colon, and must not contain newlines.
You may define more than one additional header by specifying ‘--header’ more
than once.
wget --header=’Accept-Charset: iso-8859-2’ \
--header=’Accept-Language: hr’ \
http://fly.srk.fer.hr/
Specification of an empty string as the header value will clear all previous user-
defined headers.
As of Wget 1.10, this option can be used to override headers otherwise generated
automatically. This example instructs Wget to connect to localhost, but to specify
‘foo.bar’ in the Host header:
wget --header="Host: foo.bar" http://localhost/
In versions of Wget prior to 1.10 such use of ‘--header’ caused sending of duplicate
headers.
‘--max-redirect=number ’
Specifies the maximum number of redirections to follow for a resource. The default
is 20, which is usually far more than necessary. However, on those occasions where
you want to allow more (or fewer), this is the option to use.
‘--proxy-user=user ’
‘--proxy-password=password ’
Specify the username user and password password for authentication on a proxy
server. Wget will encode them using the basic authentication scheme.
Security considerations similar to those with ‘--http-password’ pertain here as
well.
‘--referer=url ’
Include ‘Referer: url’ header in HTTP request. Useful for retrieving documents with
server-side processing that assume they are always being retrieved by interactive web
browsers and only come out properly when Referer is set to one of the pages that
point to them.
Chapter 2: Invoking 15
‘--save-headers’
Save the headers sent by the http server to the file, preceding the actual contents,
with an empty line as the separator.
‘-U agent-string ’
‘--user-agent=agent-string ’
Identify as agent-string to the http server.
The http protocol allows the clients to identify themselves using a User-Agent
header field. This enables distinguishing the www software, usually for statis-
tical purposes or for tracing of protocol violations. Wget normally identifies as
‘Wget/version ’, version being the current version number of Wget.
However, some sites have been known to impose the policy of tailoring the output
according to the User-Agent-supplied information. While this is not such a bad
idea in theory, it has been abused by servers denying information to clients other
than (historically) Netscape or, more frequently, Microsoft Internet Explorer. This
option allows you to change the User-Agent line issued by Wget. Use of this option
is discouraged, unless you really know what you are doing.
Specifying empty user agent with ‘--user-agent=""’ instructs Wget not to send
the User-Agent header in http requests.
‘--post-data=string ’
‘--post-file=file ’
Use POST as the method for all HTTP requests and send the specified data in the
request body. --post-data sends string as data, whereas --post-file sends the
contents of file. Other than that, they work in exactly the same way.
Please be aware that Wget needs to know the size of the POST data in advance.
Therefore the argument to --post-file must be a regular file; specifying a FIFO
or something like ‘/dev/stdin’ won’t work. It’s not quite clear how to work around
this limitation inherent in HTTP/1.0. Although HTTP/1.1 introduces chunked
transfer that doesn’t require knowing the request length in advance, a client can’t
use chunked unless it knows it’s talking to an HTTP/1.1 server. And it can’t know
that until it receives a response, which in turn requires the request to have been
completed – a chicken-and-egg problem.
Note: if Wget is redirected after the POST request is completed, it will not send
the POST data to the redirected URL. This is because URLs that process POST
often respond with a redirection to a regular page, which does not desire or accept
POST. It is not completely clear that this behavior is optimal; if it doesn’t work
out, it might be changed in the future.
This example shows how to log to a server using POST and then proceed to download
the desired pages, presumably only accessible to authorized users:
# Log in to the server. This can be done only once.
wget --save-cookies cookies.txt \
--post-data ’user=foo&password=bar’ \
http://server.com/auth.php
‘--content-disposition’
If this is set to on, experimental (not fully-functional) support for Content-
Disposition headers is enabled. This can currently result in extra round-trips
to the server for a HEAD request, and is known to suffer from a few bugs, which is
why it is not currently enabled by default.
This option is useful for some file-downloading CGI programs that use Content-
Disposition headers to describe what the name of a downloaded file should be.
‘--auth-no-challenge’
If this option is given, Wget will send Basic HTTP authentication information
(plaintext username and password) for all requests, just like Wget 1.10.2 and prior
did by default.
Use of this option is not recommended, and is intended only to support some few
obscure servers, which never send HTTP authentication challenges, but accept un-
solicited auth info, say, in addition to form-based authentication.
‘--certificate-type=type ’
Specify the type of the client certificate. Legal values are ‘PEM’ (assumed by default)
and ‘DER’, also known as ‘ASN1’.
‘--private-key=file ’
Read the private key from file. This allows you to provide the private key in a file
separate from the certificate.
‘--private-key-type=type ’
Specify the type of the private key. Accepted values are ‘PEM’ (the default) and
‘DER’.
‘--ca-certificate=file ’
Use file as the file with the bundle of certificate authorities (“CA”) to verify the
peers. The certificates must be in PEM format.
Without this option Wget looks for CA certificates at the system-specified locations,
chosen at OpenSSL installation time.
‘--ca-directory=directory ’
Specifies directory containing CA certificates in PEM format. Each file contains
one CA certificate, and the file name is based on a hash value derived from the cer-
tificate. This is achieved by processing a certificate directory with the c_rehash
utility supplied with OpenSSL. Using ‘--ca-directory’ is more efficient than
‘--ca-certificate’ when many certificates are installed because it allows Wget
to fetch certificates on demand.
Without this option Wget looks for CA certificates at the system-specified locations,
chosen at OpenSSL installation time.
‘--random-file=file ’
Use file as the source of random data for seeding the pseudo-random number gen-
erator on systems without ‘/dev/random’.
On such systems the SSL library needs an external source of randomness to initialize.
Randomness may be provided by EGD (see ‘--egd-file’ below) or read from an
external source specified by the user. If this option is not specified, Wget looks for
random data in $RANDFILE or, if that is unset, in ‘$HOME/.rnd’. If none of those are
available, it is likely that SSL encryption will not be usable.
If you’re getting the “Could not seed OpenSSL PRNG; disabling SSL.” error, you
should provide random data using some of the methods described above.
‘--egd-file=file ’
Use file as the EGD socket. EGD stands for Entropy Gathering Daemon, a user-
space program that collects data from various unpredictable system sources and
makes it available to other programs that might need it. Encryption software, such
as the SSL library, needs sources of non-repeating randomness to seed the random
number generator used to produce cryptographically strong keys.
OpenSSL allows the user to specify his own source of entropy using the RAND_
FILE environment variable. If this variable is unset, or if the specified file does not
produce enough randomness, OpenSSL will read random data from EGD socket
specified using this option.
If this option is not specified (and the equivalent startup command is not used),
EGD is never contacted. EGD is not needed on modern Unix systems that support
‘/dev/random’.
Chapter 2: Invoking 18
FTP has a better chance of working. However, in some rare firewall configurations,
active FTP actually works when passive FTP doesn’t. If you suspect this to be the
case, use this option, or set passive_ftp=off in your init file.
‘--retr-symlinks’
Usually, when retrieving ftp directories recursively and a symbolic link is encoun-
tered, the linked-to file is not downloaded. Instead, a matching symbolic link is
created on the local filesystem. The pointed-to file will not be downloaded un-
less this recursive retrieval would have encountered it separately and downloaded it
anyway.
When ‘--retr-symlinks’ is specified, however, symbolic links are traversed and
the pointed-to files are retrieved. At this time, this option does not cause Wget
to traverse symlinks to directories and recurse through them, but in the future it
should be enhanced to do this.
Note that when retrieving a file (not a directory) because it was specified on the
command-line, rather than because it was recursed to, this option has no effect.
Symbolic links are always traversed in this case.
‘--no-http-keep-alive’
Turn off the “keep-alive” feature for HTTP downloads. Normally, Wget asks the
server to keep the connection open so that, when you download more than one
document from the same server, they get transferred over the same TCP connection.
This saves time and at the same time reduces the load on the server.
This option is useful when, for some reason, persistent (keep-alive) connections don’t
work for you, for example due to a server bug or due to the inability of server-side
scripts to cope with the connections.
of the document that links to external content, such as embedded images, links to
style sheets, hyperlinks to non-html content, etc.
Each link will be changed in one of the two ways:
• The links to files that have been downloaded by Wget will be changed to refer
to the file they point to as a relative link.
Example: if the downloaded file ‘/foo/doc.html’ links to ‘/bar/img.gif’,
also downloaded, then the link in ‘doc.html’ will be modified to point to
‘../bar/img.gif’. This kind of transformation works reliably for arbitrary
combinations of directories.
• The links to files that have not been downloaded by Wget will be changed to
include host name and absolute path of the location they point to.
Example: if the downloaded file ‘/foo/doc.html’ links to ‘/bar/img.gif’ (or
to ‘../bar/img.gif’), then the link in ‘doc.html’ will be modified to point to
‘http://hostname /bar/img.gif’.
Because of this, local browsing works reliably: if a linked file was downloaded, the
link will refer to its local name; if it was not downloaded, the link will refer to its full
Internet address rather than presenting a broken link. The fact that the former links
are converted to relative links ensures that you can move the downloaded hierarchy
to another directory.
Note that only at the end of the download can Wget know which links have been
downloaded. Because of that, the work done by ‘-k’ will be performed at the end
of all the downloads.
‘-K’
‘--backup-converted’
When converting a file, back up the original version with a ‘.orig’ suffix. Affects
the behavior of ‘-N’ (see Section 5.2 [HTTP Time-Stamping Internals], page 30).
‘-m’
‘--mirror’
Turn on options suitable for mirroring. This option turns on recursion and time-
stamping, sets infinite recursion depth and keeps ftp directory listings. It is cur-
rently equivalent to ‘-r -N -l inf --no-remove-listing’.
‘-p’
‘--page-requisites’
This option causes Wget to download all the files that are necessary to properly
display a given html page. This includes such things as inlined images, sounds,
and referenced stylesheets.
Ordinarily, when downloading a single html page, any requisite documents that
may be needed to display it properly are not downloaded. Using ‘-r’ together with
‘-l’ can help, but since Wget does not ordinarily distinguish between external and
inlined documents, one is generally left with “leaf documents” that are missing their
requisites.
For instance, say document ‘1.html’ contains an <IMG> tag referencing ‘1.gif’ and
an <A> tag pointing to external document ‘2.html’. Say that ‘2.html’ is similar
but that its image is ‘2.gif’ and it links to ‘3.html’. Say this continues up to some
arbitrarily high number.
If one executes the command:
wget -r -l 2 http://site /1.html
Chapter 2: Invoking 21
then ‘1.html’, ‘1.gif’, ‘2.html’, ‘2.gif’, and ‘3.html’ will be downloaded. As you
can see, ‘3.html’ is without its requisite ‘3.gif’ because Wget is simply counting
the number of hops (up to 2) away from ‘1.html’ in order to determine where to
stop the recursion. However, with this command:
wget -r -l 2 -p http://site /1.html
all the above files and ‘3.html’’s requisite ‘3.gif’ will be downloaded. Similarly,
wget -r -l 1 -p http://site /1.html
will cause ‘1.html’, ‘1.gif’, ‘2.html’, and ‘2.gif’ to be downloaded. One might
think that:
wget -r -l 0 -p http://site /1.html
would download just ‘1.html’ and ‘1.gif’, but unfortunately this is not the case,
because ‘-l 0’ is equivalent to ‘-l inf’—that is, infinite recursion. To download a
single html page (or a handful of them, all specified on the command-line or in a
‘-i’ url input file) and its (or their) requisites, simply leave off ‘-r’ and ‘-l’:
wget -p http://site /1.html
Note that Wget will behave as if ‘-r’ had been specified, but only that single page
and its requisites will be downloaded. Links from that page to external documents
will not be followed. Actually, to download a single page and all its requisites (even
if they exist on separate websites), and make sure the lot displays properly locally,
this author likes to use a few options in addition to ‘-p’:
wget -E -H -k -K -p http://site /document
To finish off this topic, it’s worth knowing that Wget’s idea of an external document
link is any URL specified in an <A> tag, an <AREA> tag, or a <LINK> tag other than
<LINK REL="stylesheet">.
‘--strict-comments’
Turn on strict parsing of html comments. The default is to terminate comments
at the first occurrence of ‘-->’.
According to specifications, html comments are expressed as sgml declarations.
Declaration is special markup that begins with ‘<!’ and ends with ‘>’, such as
‘<!DOCTYPE ...>’, that may contain comments between a pair of ‘--’ delimiters.
html comments are “empty declarations”, sgml declarations without any non-
comment text. Therefore, ‘<!--foo-->’ is a valid comment, and so is ‘<!--one--
--two-->’, but ‘<!--1--2-->’ is not.
On the other hand, most html writers don’t perceive comments as anything other
than text delimited with ‘<!--’ and ‘-->’, which is not quite the same. For example,
something like ‘<!------------>’ works as a valid comment as long as the number
of dashes is a multiple of four (!). If not, the comment technically lasts until the
next ‘--’, which may be at the other end of the document. Because of this, many
popular browsers completely ignore the specification and implement what users have
come to expect: comments delimited with ‘<!--’ and ‘-->’.
Until version 1.9, Wget interpreted comments strictly, which resulted in missing
links in many web pages that displayed fine in browsers, but had the misfortune of
containing non-compliant comments. Beginning with version 1.9, Wget has joined
the ranks of clients that implements “naive” comments, terminating each comment
at the first occurrence of ‘-->’.
If, for whatever reason, you want strict comment parsing, use this option to turn it
on.
Chapter 2: Invoking 22
‘-I list ’
‘--include-directories=list ’
Specify a comma-separated list of directories you wish to follow when downloading
(see Section 4.3 [Directory-Based Limits], page 27). Elements of list may contain
wildcards.
‘-X list ’
‘--exclude-directories=list ’
Specify a comma-separated list of directories you wish to exclude from download
(see Section 4.3 [Directory-Based Limits], page 27). Elements of list may contain
wildcards.
‘-np’
‘--no-parent’
Do not ever ascend to the parent directory when retrieving recursively. This is a
useful option, since it guarantees that only the files below a certain hierarchy will
be downloaded. See Section 4.3 [Directory-Based Limits], page 27, for more details.
Chapter 3: Recursive Download 24
3 Recursive Download
GNU Wget is capable of traversing parts of the Web (or a single http or ftp server), following
links and directory structure. We refer to this as to recursive retrieval, or recursion.
With http urls, Wget retrieves and parses the html from the given url, documents,
retrieving the files the html document was referring to, through markup like href, or src. If
the freshly downloaded file is also of type text/html or application/xhtml+xml, it will be
parsed and followed further.
Recursive retrieval of http and html content is breadth-first. This means that Wget first
downloads the requested html document, then the documents linked from that document, then
the documents linked by them, and so on. In other words, Wget first downloads the documents
at depth 1, then those at depth 2, and so on until the specified maximum depth.
The maximum depth to which the retrieval may descend is specified with the ‘-l’ option.
The default maximum depth is five layers.
When retrieving an ftp url recursively, Wget will retrieve all the data from the given
directory tree (including the subdirectories up to the specified depth) on the remote server,
creating its mirror image locally. ftp retrieval is also limited by the depth parameter. Unlike
http recursion, ftp recursion is performed depth-first.
By default, Wget will create a local directory tree, corresponding to the one found on the
remote server.
Recursive retrieving can find a number of applications, the most important of which is mir-
roring. It is also useful for www presentations, and any other opportunities where slow network
connections should be bypassed by storing the files locally.
You should be warned that recursive downloads can overload the remote servers. Because of
that, many administrators frown upon them and may ban access from your site if they detect very
fast downloads of big amounts of content. When downloading from Internet servers, consider
using the ‘-w’ option to introduce a delay between accesses to the server. The download will
take a while longer, but the server administrator will not be alarmed by your rudeness.
Of course, recursive download may cause problems on your machine. If left to run unchecked,
it can easily fill up the disk. If downloading from local network, it can also take bandwidth on
the system, as well as consume memory and CPU.
Try to specify the criteria that match the kind of download you are trying to achieve. If you
want to download only one page, use ‘--page-requisites’ without any additional recursion. If
you want to download things under one directory, use ‘-np’ to avoid downloading things from
other directories. If you want to download all the files from one directory, use ‘-l 1’ to make
sure the recursion depth never exceeds one. See Chapter 4 [Following Links], page 25, for more
information about this.
Recursive retrieval should be used with care. Don’t say you were not warned.
Chapter 4: Following Links 25
4 Following Links
When retrieving recursively, one does not wish to retrieve loads of unnecessary data. Most of
the time the users bear in mind exactly what they want to download, and want Wget to follow
only specific links.
For example, if you wish to download the music archive from ‘fly.srk.fer.hr’, you will not
want to download all the home pages that happen to be referenced by an obscure part of the
archive.
Wget possesses several mechanisms that allows you to fine-tune which links it will follow.
‘-A acclist ’
‘--accept acclist ’
‘accept = acclist ’
The argument to ‘--accept’ option is a list of file suffixes or patterns that Wget
will download during recursive retrieval. A suffix is the ending part of a file, and
consists of “normal” letters, e.g. ‘gif’ or ‘.jpg’. A matching pattern contains
shell-like wildcards, e.g. ‘books*’ or ‘zelazny*196[0-9]*’.
So, specifying ‘wget -A gif,jpg’ will make Wget download only the files end-
ing with ‘gif’ or ‘jpg’, i.e. gifs and jpegs. On the other hand, ‘wget -A
"zelazny*196[0-9]*"’ will download only files beginning with ‘zelazny’ and con-
taining numbers from 1960 to 1969 anywhere within. Look up the manual of your
shell for a description of how pattern matching works.
Of course, any number of suffixes and patterns can be combined into a comma-
separated list, and given as an argument to ‘-A’.
‘-R rejlist ’
‘--reject rejlist ’
‘reject = rejlist ’
The ‘--reject’ option works the same way as ‘--accept’, only its logic is the re-
verse; Wget will download all files except the ones matching the suffixes (or patterns)
in the list.
So, if you want to download a whole page except for the cumbersome mpegs and
.au files, you can use ‘wget -R mpg,mpeg,au’. Analogously, to download all files
except the ones beginning with ‘bjork’, use ‘wget -R "bjork*"’. The quotes are to
prevent expansion by the shell.
The ‘-A’ and ‘-R’ options may be combined to achieve even better fine-tuning of which files to
retrieve. E.g. ‘wget -A "*zelazny*" -R .ps’ will download all the files having ‘zelazny’ as a
part of their name, but not the PostScript files.
Note that these two options do not affect the downloading of html files (as determined by
a ‘.htm’ or ‘.html’ filename prefix). This behavior may not be desirable for all users, and may
be changed for future versions of Wget.
Note, too, that query strings (strings at the end of a URL beginning with a question mark
(‘?’) are not included as part of the filename for accept/reject rules, even though these will
actually contribute to the name chosen for the local file. It is expected that a future version of
Wget will provide an option to allow matching against query strings.
Finally, it’s worth noting that the accept/reject lists are matched twice against downloaded
files: once against the URL’s filename portion, to determine if the file should be downloaded
in the first place; then, after it has been accepted and successfully downloaded, the local file’s
name is also checked against the accept/reject lists to see if it should be removed. The rationale
was that, since ‘.htm’ and ‘.html’ files are always downloaded regardless of accept/reject rules,
they should be removed after being downloaded and scanned for links, if they did match the
accept/reject lists. However, this can lead to unexpected results, since the local filenames can
differ from the original URL filenames in the following ways, all of which can change whether
an accept/reject rule matches:
• If the local file already exists and ‘--no-directories’ was specified, a numeric suffix will
be appended to the original name.
• If ‘--html-extension’ was specified, the local filename will have ‘.html’ appended to it. If
Wget is invoked with ‘-E -A.php’, a filename such as ‘index.php’ will match be accepted,
but upon download will be named ‘index.php.html’, which no longer matches, and so the
file will be deleted.
Chapter 4: Following Links 27
• Query strings do not contribute to URL matching, but are included in local filenames, and
so do contribute to filename matching.
This behavior, too, is considered less-than-desirable, and may change in a future version of
Wget.
5 Time-Stamping
One of the most important aspects of mirroring information from the Internet is updating your
archives.
Downloading the whole archive again and again, just to replace a few changed files is expen-
sive, both in terms of wasted bandwidth and money, and the time to do the update. This is
why all the mirroring tools offer the option of incremental updating.
Such an updating mechanism means that the remote server is scanned in search of new files.
Only those new files will be downloaded in the place of the old ones.
A file is considered new if one of these two conditions are met:
1. A file of that name does not already exist locally.
2. A file of that name does exist, but the remote file was modified more recently than the local
file.
To implement this, the program needs to be aware of the time of last modification of both
local and remote files. We call this information the time-stamp of a file.
The time-stamping in GNU Wget is turned on using ‘--timestamping’ (‘-N’) option, or
through timestamping = on directive in ‘.wgetrc’. With this option, for each file it intends
to download, Wget will check whether a local file of the same name exists. If it does, and the
remote file is older, Wget will not download it.
If the local file does not exist, or the sizes of the files do not match, Wget will download the
remote file no matter what the time-stamps say.
1
As an additional check, Wget will look at the Content-Length header, and compare the sizes; if they are not
the same, the remote file will be downloaded no matter what the time-stamp says.
Chapter 6: Startup File 31
6 Startup File
Once you know how to change default settings of Wget through command line arguments, you
may wish to make some of those settings permanent. You can do that in a convenient way by
creating the Wget startup file—‘.wgetrc’.
Besides ‘.wgetrc’ is the “main” initialization file, it is convenient to have a special facility
for storing passwords. Thus Wget reads and interprets the contents of ‘$HOME/.netrc’, if it
finds it. You can find ‘.netrc’ format in your system manuals.
Wget reads ‘.wgetrc’ upon startup, recognizing a limited set of commands.
dirstruct = on/off
Turning dirstruct on or off—the same as ‘-x’ or ‘-nd’, respectively.
dns cache = on/off
Turn DNS caching on/off. Since DNS caching is on by default, this option is nor-
mally used to turn it off and is equivalent to ‘--no-dns-cache’.
dns timeout = n
Set the DNS timeout—the same as ‘--dns-timeout’.
domains = string
Same as ‘-D’ (see Section 4.1 [Spanning Hosts], page 25).
dot bytes = n
Specify the number of bytes “contained” in a dot, as seen throughout the retrieval
(1024 by default). You can postfix the value with ‘k’ or ‘m’, representing kilobytes
and megabytes, respectively. With dot settings you can tailor the dot retrieval to
suit your needs, or you can use the predefined styles (see Section 2.5 [Download
Options], page 5).
dot spacing = n
Specify the number of dots in a single cluster (10 by default).
dots in line = n
Specify the number of dots that will be printed in each line throughout the retrieval
(50 by default).
egd file = file
Use string as the EGD socket file name. The same as ‘--egd-file=file ’.
exclude directories = string
Specify a comma-separated list of directories you wish to exclude from download—
the same as ‘-X string ’ (see Section 4.3 [Directory-Based Limits], page 27).
exclude domains = string
Same as ‘--exclude-domains=string ’ (see Section 4.1 [Spanning Hosts], page 25).
follow ftp = on/off
Follow ftp links from html documents—the same as ‘--follow-ftp’.
follow tags = string
Only follow certain html tags when doing a recursive retrieval, just like
‘--follow-tags=string ’.
force html = on/off
If set to on, force the input filename to be regarded as an html document—the
same as ‘-F’.
ftp password = string
Set your ftp password to string. Without this setting, the password defaults to
‘-wget@’, which is a useful default for anonymous ftp access.
This command used to be named passwd prior to Wget 1.10.
ftp proxy = string
Use string as ftp proxy, instead of the one specified in environment.
ftp user = string
Set ftp user to string.
This command used to be named login prior to Wget 1.10.
Chapter 6: Startup File 34
glob = on/off
Turn globbing on/off—the same as ‘--glob’ and ‘--no-glob’.
header = string
Define a header for HTTP downloads, like using ‘--header=string ’.
html extension = on/off
Add a ‘.html’ extension to ‘text/html’ or ‘application/xhtml+xml’ files without
it, like ‘-E’.
http keep alive = on/off
Turn the keep-alive feature on or off (defaults to on). Turning it off is equivalent to
‘--no-http-keep-alive’.
http password = string
Set http password, equivalent to ‘--http-password=string ’.
http proxy = string
Use string as http proxy, instead of the one specified in environment.
http user = string
Set http user to string, equivalent to ‘--http-user=string ’.
https proxy = string
Use string as https proxy, instead of the one specified in environment.
ignore case = on/off
When set to on, match files and directories case insensitively; the same as
‘--ignore-case’.
ignore length = on/off
When set to on, ignore Content-Length header; the same as ‘--ignore-length’.
ignore tags = string
Ignore certain html tags when doing a recursive retrieval, like
‘--ignore-tags=string ’.
include directories = string
Specify a comma-separated list of directories you wish to follow when downloading—
the same as ‘-I string ’.
inet4 only = on/off
Force connecting to IPv4 addresses, off by default. You can put this in the global
init file to disable Wget’s attempts to resolve and connect to IPv6 hosts. Available
only if Wget was compiled with IPv6 support. The same as ‘--inet4-only’ or ‘-4’.
inet6 only = on/off
Force connecting to IPv6 addresses, off by default. Available only if Wget was
compiled with IPv6 support. The same as ‘--inet6-only’ or ‘-6’.
input = file
Read the urls from string, like ‘-i file ’.
limit rate = rate
Limit the download speed to no more than rate bytes per second. The same as
‘--limit-rate=rate ’.
load cookies = file
Load cookies from file. See ‘--load-cookies file ’.
logfile = file
Set logfile to file, the same as ‘-o file ’.
Chapter 6: Startup File 35
See Section 9.1 [Robot Exclusion], page 48, for more details about this. Be sure you
know what you are doing before turning this off.
save cookies = file
Save cookies to file. The same as ‘--save-cookies file ’.
secure protocol = string
Choose the secure protocol to be used. Legal values are ‘auto’ (the default), ‘SSLv2’,
‘SSLv3’, and ‘TLSv1’. The same as ‘--secure-protocol=string ’.
server response = on/off
Choose whether or not to print the http and ftp server responses—the same as
‘-S’.
span hosts = on/off
Same as ‘-H’.
strict comments = on/off
Same as ‘--strict-comments’.
timeout = n
Set all applicable timeout values to n, the same as ‘-T n ’.
timestamping = on/off
Turn timestamping on/off. The same as ‘-N’ (see Chapter 5 [Time-Stamping],
page 29).
tries = n Set number of retries per url—the same as ‘-t n ’.
use proxy = on/off
When set to off, don’t use proxy even when proxy-related environment variables are
set. In that case it is the same as using ‘--no-proxy’.
user = string
Specify username string for both ftp and http file retrieval. This command can
be overridden using the ‘ftp_user’ and ‘http_user’ command for ftp and http
respectively.
verbose = on/off
Turn verbose on/off—the same as ‘-v’/‘-nv’.
wait = n Wait n seconds between retrievals—the same as ‘-w n ’.
wait retry = n
Wait up to n seconds between retries of failed retrievals only—the same as
‘--waitretry=n ’. Note that this is turned on by default in the global ‘wgetrc’.
## You can use this file to change the default behaviour of wget or to
Chapter 6: Startup File 38
## avoid having to type many many command-line options. This file does
## not contain a comprehensive list of commands -- look at the manual
## to find out what you can put into this file.
##
## Wget initialization file can reside in /usr/local/etc/wgetrc
## (global, for all users) or $HOME/.wgetrc (for a single user).
##
## To use the settings in this file, you will have to uncomment them,
## as well as change them, in most cases, as the values on the
## commented-out lines are the default values (e.g. "off").
##
## Global settings (useful for setting up in /usr/local/etc/wgetrc).
## Think well before you change them, since they may reduce wget’s
## functionality, and make it behave contrary to the documentation:
##
# You can lower (or raise) the default number of retries when
# downloading a file (default is 20).
#tries = 20
# The "wait" command below makes Wget wait between every connection.
# If, instead, you want Wget to wait only between retries of failed
# downloads, set waitretry to maximum number of seconds to wait (Wget
# will use "linear backoff", waiting 1 second after the first failure
# on a file, 2 seconds after the second failure, etc. up to this max).
waitretry = 10
##
## Local settings (for a user to set in his $HOME/.wgetrc). It is
## *highly* undesirable to put these settings in the global file, since
Chapter 6: Startup File 39
# You can set the default proxies for Wget to use for http and ftp.
# They will override the value in the environment.
#http_proxy = http://proxy.yoyodyne.com:18023/
#ftp_proxy = http://proxy.yoyodyne.com:18023/
# You can customize the retrieval outlook. Valid options are default,
# binary, mega and micro.
#dot_style = default
# To have Wget follow FTP links from HTML files by default, set this
# to on:
#follow_ftp = off
Chapter 7: Examples 41
7 Examples
The examples are divided into three sections loosely based on their complexity.
8 Various
This chapter contains all the stuff that could not fit anywhere else.
8.1 Proxies
Proxies are special-purpose http servers designed to transfer data from remote servers to local
clients. One typical use of proxies is lightening network load for users behind a slow connection.
This is achieved by channeling all http and ftp requests through the proxy which caches the
transferred data. When a cached resource is requested again, proxy will return the data from
cache. Another use for proxies is for companies that separate (for security reasons) their internal
networks from the rest of Internet. In order to obtain information from the Web, their users
connect and retrieve remote data using an authorized proxy.
Wget supports proxies for both http and ftp retrievals. The standard way to specify proxy
location, which Wget recognizes, is using the following environment variables:
http_proxy
https_proxy
If set, the http_proxy and https_proxy variables should contain the urls of the
proxies for http and https connections respectively.
ftp_proxy
This variable should contain the url of the proxy for ftp connections. It is quite
common that http_proxy and ftp_proxy are set to the same url.
no_proxy This variable should contain a comma-separated list of domain extensions proxy
should not be used for. For instance, if the value of no_proxy is ‘.mit.edu’, proxy
will not be used to retrieve documents from MIT.
In addition to the environment variables, proxy location and settings may be specified from
within Wget itself.
‘--no-proxy’
‘proxy = on/off’
This option and the corresponding command may be used to suppress the use of
proxy, even if the appropriate environment variables are set.
‘http_proxy = URL ’
‘https_proxy = URL ’
‘ftp_proxy = URL ’
‘no_proxy = string ’
These startup file variables allow you to override the proxy settings specified by the
environment.
Some proxy servers require authorization to enable you to use them. The authorization
consists of username and password, which must be sent by Wget. As with http authorization,
several authentication schemes exist. For proxy authorization only the Basic authentication
scheme is currently implemented.
You may specify your username and password either through the proxy url or through the
command-line options. Assuming that the company’s proxy is located at ‘proxy.company.com’
at port 8001, a proxy url location containing authorization data might look like this:
http://hniksic:mypassword@proxy.company.com:8001/
Alternatively, you may use the ‘proxy-user’ and ‘proxy-password’ options, and the equiv-
alent ‘.wgetrc’ settings proxy_user and proxy_password to set the proxy username and pass-
word.
Chapter 8: Various 45
8.2 Distribution
Like all GNU utilities, the latest version of Wget can be found at the master GNU
archive site ftp.gnu.org, and its mirrors. For example, Wget 1.11.4 can be found at
ftp://ftp.gnu.org/pub/gnu/wget/wget-1.11.4.tar.gz
should try to see if the crash is repeatable, and if will occur with a simpler set of op-
tions. You might even try to start the download at the page where the crash occurred to
see if that page somehow triggered the crash.
Also, while I will probably be interested to know the contents of your ‘.wgetrc’ file, just
dumping it into the debug message is probably a bad idea. Instead, you should first try
to see if the bug repeats with ‘.wgetrc’ moved out of the way. Only if it turns out that
‘.wgetrc’ settings affect the bug, mail me the relevant parts of the file.
3. Please start Wget with ‘-d’ option and send us the resulting output (or relevant parts
thereof). If Wget was compiled without debug support, recompile it—it is much easier to
trace bugs with debug support on.
Note: please make sure to remove any potentially sensitive information from the debug log
before sending it to the bug address. The -d won’t go out of its way to collect sensitive
information, but the log will contain a fairly complete transcript of Wget’s communication
with the server, which may include passwords and pieces of downloaded data. Since the
bug address is publically archived, you may assume that all bug reports are visible to the
public.
4. If Wget has crashed, try to run it in a debugger, e.g. gdb ‘which wget‘ core and type
where to get the backtrace. This may not work if the system administrator has disabled
core files, but it is safe to try.
8.7 Portability
Like all GNU software, Wget works on the GNU system. However, since it uses GNU Autoconf
for building and configuring, and mostly avoids using “special” features of any particular Unix,
it should compile (and work) on all common Unix flavors.
Various Wget versions have been compiled and tested under many kinds of Unix systems,
including GNU/Linux, Solaris, SunOS 4.x, Mac OS X, OSF (aka Digital Unix or Tru64), Ultrix,
*BSD, IRIX, AIX, and others. Some of those systems are no longer in widespread use and may
not be able to support recent versions of Wget. If Wget fails to compile on your system, we
would like to know about it.
Thanks to kind contributors, this version of Wget compiles and works on 32-bit Microsoft
Windows platforms. It has been compiled successfully using MS Visual C++ 6.0, Watcom,
Borland C, and GCC compilers. Naturally, it is crippled of some features available on Unix,
but it should work as a substitute for people stuck with Windows. Note that Windows-specific
portions of Wget are not guaranteed to be supported in the future, although this has been the
case in practice for many years now. All questions and problems in Windows usage should
be reported to Wget mailing list at wget@sunsite.dk where the volunteers who maintain the
Windows-related features might look at them.
Support for building on MS-DOS via DJGPP has been contributed by Gisle Vanem; a port
to VMS is maintained by Steven Schweda, and is available at http://antinode.org/.
8.8 Signals
Since the purpose of Wget is background work, it catches the hangup signal (SIGHUP) and
ignores it. If the output was on standard output, it will be redirected to a file named ‘wget-log’.
Otherwise, SIGHUP is ignored. This is convenient when you wish to redirect the output of Wget
after having started it.
$ wget http://www.gnus.org/dist/gnus.tar.gz &
...
$ kill -HUP %%
SIGHUP received, redirecting output to ‘wget-log’.
Chapter 8: Various 47
Other than that, Wget will not try to interfere with signals in any way. C-c, kill -TERM
and kill -KILL should kill it alike.
Chapter 9: Appendices 48
9 Appendices
This chapter contains some references I consider useful.
9.3 Contributors
GNU Wget was written by Hrvoje Nikšić hniksic@xemacs.org, and it is currently maintained
by Micah Cowan micah@cowan.name.
However, the development of Wget could never have gone as far as it has, were it not for
the help of many people, either with bug reports, feature proposals, patches, or letters saying
“Thanks!”.
Special thanks goes to the following people (no particular order):
• Dan Harkless—contributed a lot of code and documentation of extremely high quality, as
well as the --page-requisites and related options. He was the principal maintainer for
some time and released Wget 1.6.
• Ian Abbott—contributed bug fixes, Windows-related fixes, and provided a prototype im-
plementation of the breadth-first recursive download. Co-maintained Wget during the 1.8
release cycle.
• The dotsrc.org crew, in particular Karsten Thygesen—donated system resources such as
the mailing list, web space, ftp space, and version control repositories, along with a lot of
time to make these actually work. Christian Reiniger was of invaluable help with setting
up Subversion.
• Heiko Herold—provided high-quality Windows builds and contributed bug and build reports
for many years.
• Shawn McHorse—bug reports and patches.
• Kaveh R. Ghazi—on-the-fly ansi2knr-ization. Lots of portability fixes.
• Gordon Matzigkeit—‘.netrc’ support.
• Zlatko Čalušić, Tomislav Vujec and Dražen Kačar—feature suggestions and “philosophical”
discussions.
• Darko Budor—initial port to Windows.
• Antonio Rosella—help and suggestions, plus the initial Italian translation.
• Tomislav Petrović, Mario Mikočević—many bug reports and suggestions.
• François Pinard—many thorough bug reports and discussions.
• Karl Eichwalder—lots of help with internationalization, Makefile layout and many other
things.
• Junio Hamano—donated support for Opie and http Digest authentication.
Chapter 9: Appendices 50
• Mauro Tortonesi—Improved IPv6 support, adding support for dual family systems. Refac-
tored and enhanced FTP IPv6 code. Maintained GNU Wget from 2004–2008.
• Christopher G. Lewis—Maintenance of the Windows version of GNU WGet.
• Gisle Vanem—Many helpful patches and improvements, especially for Windows and MS-
DOS support.
• People who provided donations for development—including Brian Gough.
The following people have provided patches, bug/build reports, useful suggestions, beta test-
ing services, fan mail and all the other things that make maintenance so much fun:
Tim Adam, Adrian Aichner, Martin Baehr, Dieter Baron, Roger Beeman, Dan Berger, T.
Bharath, Christian Biere, Paul Bludov, Daniel Bodea, Mark Boyns, John Burden, Julien Buty,
Wanderlei Cavassin, Gilles Cedoc, Tim Charron, Noel Cragg, Kristijan Čonkaš, John Daily, An-
dreas Damm, Ahmon Dancy, Andrew Davison, Bertrand Demiddelaer, Alexander Dergachev,
Andrew Deryabin, Ulrich Drepper, Marc Duponcheel, Damir Džeko, Alan Eldridge, Hans-
Andreas Engel, Aleksandar Erkalović, Andy Eskilsson, João Ferreira, Christian Fraenkel, David
Fritz, Charles C. Fu, FUJISHIMA Satsuki, Masashi Fujita, Howard Gayle, Marcel Gerrits,
Lemble Gregory, Hans Grobler, Mathieu Guillaume, Aaron Hawley, Jochen Hein, Karl Heuer,
HIROSE Masaaki, Ulf Harnhammar, Gregor Hoffleit, Erik Magnus Hulthen, Richard Huveneers,
Jonas Jensen, Larry Jones, Simon Josefsson, Mario Jurić, Hack Kampbjørn, Const Kaplinsky,
Goran Kezunović, Igor Khristophorov, Robert Kleine, KOJIMA Haime, Fila Kolodny, Alexan-
der Kourakos, Martin Kraemer, Sami Krank, Σίµoς Ξενιτ´λλης (Simos KSenitellis), Christian
Lackas, Hrvoje Lacko, Daniel S. Lewart, Nicolás Lichtmeier, Dave Love, Alexander V. Lukyanov,
Thomas Lußnig, Andre Majorel, Aurelien Marchand, Matthew J. Mellon, Jordan Mendelson,
Lin Zhe Min, Jan Minar, Tim Mooney, Keith Moore, Adam D. Moss, Simon Munton, Charlie Ne-
gyesi, R. K. Owen, Leonid Petrov, Simone Piunno, Andrew Pollock, Steve Pothier, Jan Přikryl,
Marin Purgar, Csaba Ráduly, Keith Refson, Bill Richardson, Tyler Riddle, Tobias Ringstrom,
Jochen Roderburg, Juan José Rodrı́guez, Maciej W. Rozycki, Edward J. Sabol, Heinz Salz-
mann, Robert Schmidt, Nicolas Schodet, Andreas Schwab, Steven M. Schweda, Chris Seawood,
Dennis Smit, Toomas Soome, Tage Stabell-Kulo, Philip Stadermann, Daniel Stenberg, Sven
Sternberger, Markus Strasser, John Summerfield, Szakacsits Szabolcs, Mike Thomas, Philipp
Thomas, Mauro Tortonesi, Dave Turner, Gisle Vanem, Rabin Vincent, Russell Vincent, Željko
Vrba, Charles G Waldman, Douglas E. Wegscheid, Ralf Wildenhues, Joshua David Williams,
YAMAZAKI Makoto, Jasmin Zainul, Bojan Ždrnja, Kristijan Zimmer.
Apologies to all who I accidentally left out, and many thanks to all the subscribers of the
Wget mailing list.
Appendix A: Copying this manual 51
A Front-Cover Text may be at most 5 words, and a Back-Cover Text may be at most 25
words.
A “Transparent” copy of the Document means a machine-readable copy, represented in a
format whose specification is available to the general public, that is suitable for revising
the document straightforwardly with generic text editors or (for images composed of pixels)
generic paint programs or (for drawings) some widely available drawing editor, and that is
suitable for input to text formatters or for automatic translation to a variety of formats
suitable for input to text formatters. A copy made in an otherwise Transparent file format
whose markup, or absence of markup, has been arranged to thwart or discourage subsequent
modification by readers is not Transparent. An image format is not Transparent if used for
any substantial amount of text. A copy that is not “Transparent” is called “Opaque”.
Examples of suitable formats for Transparent copies include plain ascii without markup,
Texinfo input format, LaTEX input format, SGML or XML using a publicly available DTD,
and standard-conforming simple HTML, PostScript or PDF designed for human modifica-
tion. Examples of transparent image formats include PNG, XCF and JPG. Opaque formats
include proprietary formats that can be read and edited only by proprietary word proces-
sors, SGML or XML for which the DTD and/or processing tools are not generally available,
and the machine-generated HTML, PostScript or PDF produced by some word processors
for output purposes only.
The “Title Page” means, for a printed book, the title page itself, plus such following pages
as are needed to hold, legibly, the material this License requires to appear in the title page.
For works in formats which do not have any title page as such, “Title Page” means the
text near the most prominent appearance of the work’s title, preceding the beginning of the
body of the text.
A section “Entitled XYZ” means a named subunit of the Document whose title either
is precisely XYZ or contains XYZ in parentheses following text that translates XYZ in
another language. (Here XYZ stands for a specific section name mentioned below, such
as “Acknowledgements”, “Dedications”, “Endorsements”, or “History”.) To “Preserve the
Title” of such a section when you modify the Document means that it remains a section
“Entitled XYZ” according to this definition.
The Document may include Warranty Disclaimers next to the notice which states that
this License applies to the Document. These Warranty Disclaimers are considered to be
included by reference in this License, but only as regards disclaiming warranties: any other
implication that these Warranty Disclaimers may have is void and has no effect on the
meaning of this License.
2. VERBATIM COPYING
You may copy and distribute the Document in any medium, either commercially or noncom-
mercially, provided that this License, the copyright notices, and the license notice saying
this License applies to the Document are reproduced in all copies, and that you add no
other conditions whatsoever to those of this License. You may not use technical measures
to obstruct or control the reading or further copying of the copies you make or distribute.
However, you may accept compensation in exchange for copies. If you distribute a large
enough number of copies you must also follow the conditions in section 3.
You may also lend copies, under the same conditions stated above, and you may publicly
display copies.
3. COPYING IN QUANTITY
If you publish printed copies (or copies in media that commonly have printed covers) of the
Document, numbering more than 100, and the Document’s license notice requires Cover
Texts, you must enclose the copies in covers that carry, clearly and legibly, all these Cover
Texts: Front-Cover Texts on the front cover, and Back-Cover Texts on the back cover. Both
Appendix A: Copying this manual 53
covers must also clearly and legibly identify you as the publisher of these copies. The front
cover must present the full title with all words of the title equally prominent and visible.
You may add other material on the covers in addition. Copying with changes limited to
the covers, as long as they preserve the title of the Document and satisfy these conditions,
can be treated as verbatim copying in other respects.
If the required texts for either cover are too voluminous to fit legibly, you should put the
first ones listed (as many as fit reasonably) on the actual cover, and continue the rest onto
adjacent pages.
If you publish or distribute Opaque copies of the Document numbering more than 100, you
must either include a machine-readable Transparent copy along with each Opaque copy,
or state in or with each Opaque copy a computer-network location from which the general
network-using public has access to download using public-standard network protocols a
complete Transparent copy of the Document, free of added material. If you use the latter
option, you must take reasonably prudent steps, when you begin distribution of Opaque
copies in quantity, to ensure that this Transparent copy will remain thus accessible at the
stated location until at least one year after the last time you distribute an Opaque copy
(directly or through your agents or retailers) of that edition to the public.
It is requested, but not required, that you contact the authors of the Document well before
redistributing any large number of copies, to give them a chance to provide you with an
updated version of the Document.
4. MODIFICATIONS
You may copy and distribute a Modified Version of the Document under the conditions
of sections 2 and 3 above, provided that you release the Modified Version under precisely
this License, with the Modified Version filling the role of the Document, thus licensing
distribution and modification of the Modified Version to whoever possesses a copy of it. In
addition, you must do these things in the Modified Version:
A. Use in the Title Page (and on the covers, if any) a title distinct from that of the
Document, and from those of previous versions (which should, if there were any, be
listed in the History section of the Document). You may use the same title as a previous
version if the original publisher of that version gives permission.
B. List on the Title Page, as authors, one or more persons or entities responsible for
authorship of the modifications in the Modified Version, together with at least five of
the principal authors of the Document (all of its principal authors, if it has fewer than
five), unless they release you from this requirement.
C. State on the Title page the name of the publisher of the Modified Version, as the
publisher.
D. Preserve all the copyright notices of the Document.
E. Add an appropriate copyright notice for your modifications adjacent to the other copy-
right notices.
F. Include, immediately after the copyright notices, a license notice giving the public
permission to use the Modified Version under the terms of this License, in the form
shown in the Addendum below.
G. Preserve in that license notice the full lists of Invariant Sections and required Cover
Texts given in the Document’s license notice.
H. Include an unaltered copy of this License.
I. Preserve the section Entitled “History”, Preserve its Title, and add to it an item stating
at least the title, year, new authors, and publisher of the Modified Version as given
on the Title Page. If there is no section Entitled “History” in the Document, create
one stating the title, year, authors, and publisher of the Document as given on its
Appendix A: Copying this manual 54
Title Page, then add an item describing the Modified Version as stated in the previous
sentence.
J. Preserve the network location, if any, given in the Document for public access to a
Transparent copy of the Document, and likewise the network locations given in the
Document for previous versions it was based on. These may be placed in the “History”
section. You may omit a network location for a work that was published at least four
years before the Document itself, or if the original publisher of the version it refers to
gives permission.
K. For any section Entitled “Acknowledgements” or “Dedications”, Preserve the Title
of the section, and preserve in the section all the substance and tone of each of the
contributor acknowledgements and/or dedications given therein.
L. Preserve all the Invariant Sections of the Document, unaltered in their text and in their
titles. Section numbers or the equivalent are not considered part of the section titles.
M. Delete any section Entitled “Endorsements”. Such a section may not be included in
the Modified Version.
N. Do not retitle any existing section to be Entitled “Endorsements” or to conflict in title
with any Invariant Section.
O. Preserve any Warranty Disclaimers.
If the Modified Version includes new front-matter sections or appendices that qualify as
Secondary Sections and contain no material copied from the Document, you may at your
option designate some or all of these sections as invariant. To do this, add their titles to
the list of Invariant Sections in the Modified Version’s license notice. These titles must be
distinct from any other section titles.
You may add a section Entitled “Endorsements”, provided it contains nothing but endorse-
ments of your Modified Version by various parties—for example, statements of peer review
or that the text has been approved by an organization as the authoritative definition of a
standard.
You may add a passage of up to five words as a Front-Cover Text, and a passage of up
to 25 words as a Back-Cover Text, to the end of the list of Cover Texts in the Modified
Version. Only one passage of Front-Cover Text and one of Back-Cover Text may be added
by (or through arrangements made by) any one entity. If the Document already includes
a cover text for the same cover, previously added by you or by arrangement made by the
same entity you are acting on behalf of, you may not add another; but you may replace the
old one, on explicit permission from the previous publisher that added the old one.
The author(s) and publisher(s) of the Document do not by this License give permission to
use their names for publicity for or to assert or imply endorsement of any Modified Version.
5. COMBINING DOCUMENTS
You may combine the Document with other documents released under this License, under
the terms defined in section 4 above for modified versions, provided that you include in the
combination all of the Invariant Sections of all of the original documents, unmodified, and
list them all as Invariant Sections of your combined work in its license notice, and that you
preserve all their Warranty Disclaimers.
The combined work need only contain one copy of this License, and multiple identical
Invariant Sections may be replaced with a single copy. If there are multiple Invariant
Sections with the same name but different contents, make the title of each such section
unique by adding at the end of it, in parentheses, the name of the original author or
publisher of that section if known, or else a unique number. Make the same adjustment to
the section titles in the list of Invariant Sections in the license notice of the combined work.
Appendix A: Copying this manual 55
In the combination, you must combine any sections Entitled “History” in the various original
documents, forming one section Entitled “History”; likewise combine any sections Entitled
“Acknowledgements”, and any sections Entitled “Dedications”. You must delete all sections
Entitled “Endorsements.”
6. COLLECTIONS OF DOCUMENTS
You may make a collection consisting of the Document and other documents released under
this License, and replace the individual copies of this License in the various documents with
a single copy that is included in the collection, provided that you follow the rules of this
License for verbatim copying of each of the documents in all other respects.
You may extract a single document from such a collection, and distribute it individually
under this License, provided you insert a copy of this License into the extracted document,
and follow this License in all other respects regarding verbatim copying of that document.
7. AGGREGATION WITH INDEPENDENT WORKS
A compilation of the Document or its derivatives with other separate and independent
documents or works, in or on a volume of a storage or distribution medium, is called an
“aggregate” if the copyright resulting from the compilation is not used to limit the legal
rights of the compilation’s users beyond what the individual works permit. When the
Document is included in an aggregate, this License does not apply to the other works in
the aggregate which are not themselves derivative works of the Document.
If the Cover Text requirement of section 3 is applicable to these copies of the Document,
then if the Document is less than one half of the entire aggregate, the Document’s Cover
Texts may be placed on covers that bracket the Document within the aggregate, or the
electronic equivalent of covers if the Document is in electronic form. Otherwise they must
appear on printed covers that bracket the whole aggregate.
8. TRANSLATION
Translation is considered a kind of modification, so you may distribute translations of the
Document under the terms of section 4. Replacing Invariant Sections with translations
requires special permission from their copyright holders, but you may include translations
of some or all Invariant Sections in addition to the original versions of these Invariant
Sections. You may include a translation of this License, and all the license notices in
the Document, and any Warranty Disclaimers, provided that you also include the original
English version of this License and the original versions of those notices and disclaimers. In
case of a disagreement between the translation and the original version of this License or a
notice or disclaimer, the original version will prevail.
If a section in the Document is Entitled “Acknowledgements”, “Dedications”, or “History”,
the requirement (section 4) to Preserve its Title (section 1) will typically require changing
the actual title.
9. TERMINATION
You may not copy, modify, sublicense, or distribute the Document except as expressly
provided for under this License. Any other attempt to copy, modify, sublicense or distribute
the Document is void, and will automatically terminate your rights under this License.
However, parties who have received copies, or rights, from you under this License will not
have their licenses terminated so long as such parties remain in full compliance.
10. FUTURE REVISIONS OF THIS LICENSE
The Free Software Foundation may publish new, revised versions of the GNU Free Doc-
umentation License from time to time. Such new versions will be similar in spirit to
the present version, but may differ in detail to address new problems or concerns. See
http://www.gnu.org/copyleft/.
Appendix A: Copying this manual 56
Each version of the License is given a distinguishing version number. If the Document
specifies that a particular numbered version of this License “or any later version” applies
to it, you have the option of following the terms and conditions either of that specified
version or of any later version that has been published (not as a draft) by the Free Software
Foundation. If the Document does not specify a version number of this License, you may
choose any version ever published (not as a draft) by the Free Software Foundation.
Appendix A: Copying this manual 57
Concept Index
# dot style . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
#wget . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 downloading multiple times . . . . . . . . . . . . . . . . . . . . . . 5
. E
.html extension . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 EGD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
.listing files, removing . . . . . . . . . . . . . . . . . . . . . . . . . . 18 entropy, specifying source of . . . . . . . . . . . . . . . . . . . . 17
.netrc . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
.wgetrc . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 exclude directories . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
execute wgetrc command . . . . . . . . . . . . . . . . . . . . . . . . 3
A
accept directories . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 F
accept suffixes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 FDL, GNU Free Documentation License . . . . . . . . . 51
accept wildcards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 features . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
append to log . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 file names, restrict. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
arguments . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 filling proxy cache . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
authentication . . . . . . . . . . . . . . . . . . . . . . . . . . 11, 12, 16 follow FTP links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
following ftp links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
following links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
B force html . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
backing up converted files . . . . . . . . . . . . . . . . . . . . . . . 20 ftp authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
bandwidth, limit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 ftp password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
base for relative links in input file . . . . . . . . . . . . . . . . 5 ftp time-stamping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
bind address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 ftp user . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
bug reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
bugs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
G
globbing, toggle . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
C
cache. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
caching of DNS lookups . . . . . . . . . . . . . . . . . . . . . . . . . 9 H
case fold . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
hangup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
client IP address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
header, add . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
clobbering, file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
hosts, spanning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
command line . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
comments, html . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 html comments. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21
connect timeout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 http password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
Content-Disposition . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 http referer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
Content-Length, ignore . . . . . . . . . . . . . . . . . . . . . . . . . 14 http time-stamping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
continue retrieval . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 http user . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
contributors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
conversion of links. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
cookies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 I
cookies, loading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 ignore case . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
cookies, saving . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 ignore length . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
cookies, session . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 include directories . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
cut directories . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 incomplete downloads . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
incremental updating . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
input-file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
D Internet Relay Chat . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
debug . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 invoking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
delete after retrieval . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 IP address, client . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
directories . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 IPv6 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
directories, exclude . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 IRC . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
directories, include . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
directory limits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
directory prefix . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 K
DNS cache. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 Keep-Alive, turning off . . . . . . . . . . . . . . . . . . . . . . . . . 19
DNS timeout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
Appendix A: Concept Index 59
L reject wildcards . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
latest version . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 relative links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
limit bandwidth . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 reporting bugs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
link conversion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 required images, downloading . . . . . . . . . . . . . . . . . . . 20
links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25 resume download . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 retries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
loading cookies. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13 retries, waiting between . . . . . . . . . . . . . . . . . . . . . . . . . . 8
location of wgetrc . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31 retrieving . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
log file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 robot exclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
robots.txt . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
M S
mailing list . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
mirroring . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 sample wgetrc . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
saving cookies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
N server maintenance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
no parent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27 server response, print . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
no-clobber . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 server response, save . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
nohup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 session cookies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
number of retries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 signal handling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
spanning hosts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
spider . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
O SSL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
operating systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46 SSL certificate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
option syntax . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 SSL certificate authority . . . . . . . . . . . . . . . . . . . . . . . . 17
output file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 SSL certificate type, specify . . . . . . . . . . . . . . . . . . . . . 16
overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 SSL certificate, check . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
SSL protocol, choose . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
startup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
P startup file . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
page requisites . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 suffixes, accept . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
passive ftp . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 suffixes, reject . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 symbolic links, retrieving . . . . . . . . . . . . . . . . . . . . . . . 19
pause . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 syntax of options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
Persistent Connections, disabling . . . . . . . . . . . . . . . . 19 syntax of wgetrc . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
portability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
POST . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
progress indicator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 T
proxies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44 tag-based recursive pruning . . . . . . . . . . . . . . . . . . . . . 22
proxy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9, 12 time-stamping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
proxy authentication . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 time-stamping usage . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
proxy filling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 timeout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
proxy password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 timeout, connect . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
proxy user . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 timeout, DNS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
timeout, read . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
timestamping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
Q tries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
quiet . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 types of files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
quota . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
U
R updating the archives . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
random wait . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 URL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
randomness, specifying source of . . . . . . . . . . . . . . . . 17 URL syntax . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
rate, limit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 usage, time-stamping . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
read timeout . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 user . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
recursion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 user-agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15
recursive download . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
redirect . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
redirecting output . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42 V
referer, http . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
various . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
reject directories . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
verbose . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
reject suffixes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Appendix A: Concept Index 60
W wgetrc . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
wgetrc commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
wait . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
wgetrc location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
wait, random . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 wgetrc syntax . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
waiting between retries . . . . . . . . . . . . . . . . . . . . . . . . . . 8 wildcards, accept . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
web site . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45 wildcards, reject . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Wget as spider . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 Windows file names . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
iii
Table of Contents
1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
2 Invoking . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
2.1 URL Format . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
2.2 Option Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
2.3 Basic Startup Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
2.4 Logging and Input File Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
2.5 Download Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
2.6 Directory Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
2.7 HTTP Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
2.8 HTTPS (SSL/TLS) Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
2.9 FTP Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
2.10 Recursive Retrieval Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
2.11 Recursive Accept/Reject Options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
3 Recursive Download . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
4 Following Links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
4.1 Spanning Hosts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
4.2 Types of Files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25
4.3 Directory-Based Limits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
4.4 Relative Links. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
4.5 Following FTP Links . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 28
5 Time-Stamping . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
5.1 Time-Stamping Usage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 29
5.2 HTTP Time-Stamping Internals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
5.3 FTP Time-Stamping Internals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 30
6 Startup File . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
6.1 Wgetrc Location . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
6.2 Wgetrc Syntax . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
6.3 Wgetrc Commands . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31
6.4 Sample Wgetrc . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
7 Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
7.1 Simple Usage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
7.2 Advanced Usage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41
7.3 Very Advanced Usage . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 42
iv
8 Various . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
8.1 Proxies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44
8.2 Distribution. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
8.3 Web Site . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
8.4 Mailing List. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
8.5 Internet Relay Chat . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
8.6 Reporting Bugs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 45
8.7 Portability . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
8.8 Signals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 46
9 Appendices . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
9.1 Robot Exclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 48
9.2 Security Considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
9.3 Contributors . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
Concept Index . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58