RPort - remote access and remote management
Toggle Dark/Light/Auto modeToggle Dark/Light/Auto modeToggle Dark/Light/Auto modeBack to homepage


Some features require the rport server to send messages, e.g., 2FA Auth requires sending a verification code to a user.


To enable sending emails, enter the following lines to the rportd.config, for example:

  server = 'smtp.example.com:2525'
  sender_email = 'rport@gmail.com'
  auth_username = 'john.doe'
  auth_password = 'secret'
  secure = false
smtp server and port separated by a colon, e.g. smtp.example.com:2525. If you use port 465 with Implicit(Forced) TLS then secure param should be enabled.

sender_email :an email that is used by rport server as its sender.


a username for authentication;
a password for the username;
true|false, set to true if Implicit(Forced) TLS must be used.


Follow a link to have a quick Pushover intro.

In order to enable sending messages via pushover:

  1. Register pushover account (if you don’t have an existing account).

  2. Register pushover API token that will be used to send messages by rport server (if you don’t have it yet).

  3. Enter the following lines to the rportd.config, for example:

      api_token = "afapzrcv5801jeaw71b4odjyn1m2e5"
      user_key = "pgcjszdyures33k4m4e12e9ggc1syo"
  4. Use any of pushover device clients to receive the messages.


You can create a custom script to send the 2FA verification code. This way you can use messengers like Telegram and many others. Inside the [api] section of rportd.conf insert the full path to an executable script for two_fa_token_delivery parameter. For example:

two_fa_token_delivery = '/usr/local/bin/2fa-sender'

The token and the recipient’s details are passed as environmental variables to the script. Create the file /usr/local/bin/2fa-sender with the following content, and make the script executable with chmod +x.

date > /tmp/2fa-sender.txt
printenv >> /tmp/2fa-sender.txt

Try to log in, and the script creates the following output.

Fri Aug 13 13:36:25 UTC 2021
RPORT_2FA_USER_AGENT='Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:99.0) Gecko/20100101 Firefox/99.0'

The value of RPORT_2FA_SENDTO may vary. It’s the value specified in the 2fa_sendto column of the user table or the auth file.

Additionally, you can specify how the api should validate updates of the 2fa_sendto. This prevents users entering values that cannot be processed by your script. Use two_fa_send_to_type = 'email' to accept only valid email address or specify a regular expression.

If the script exits with an exit code other than 0 the API request returns HTTP Status code 500 along with the STDERR output of the script.

When handing over the token using curl, consider using the -f option of curl. On any other http status code than 200 curl will exit with a non-zero status code. This way the rport server knows about a failed request, and the API includes the error for further processing.

Telegram example

A script that sends the token via Telegram can work like this example. You must create a bot first and grab the token of it.

curl -fs -X POST $URL \
  -d chat_id=$RPORT_2FA_SENDTO \
  -d text="Your RPort 2fa token: $RPORT_2FA_TOKEN (valid for $RPORT_2FA_TOKEN_TTL seconds)"


Rport will make a POST request to the specified URL. The token and the recipient’s details are passed as form values. This method requires base_url to be set in server config.

Example using free 2FA service:

two_fa_token_delivery = 'https://free-2fa-sender.rport.io'