Thanks. So basically, one has to have "access" to the config file, right? Without a config file, it seems one needs to guess the configurations. In this case, what happens if for example filename_encryption is set to a different value?
What I was imagining is that rclone "sees" the encrypted remote, asks for a password, and adds it as a remote. This does not seem possible, right?
since you do not want to copy the config file from machine one to machine two:
you must create a new remote encrypted-remote on machine two, using the same settings as machine one.
then on machine two, rclone can see the encrypted remote.
Thanks, that makes sense.
The workflow I had in mind though is similar to encryption with LUKS.
If I encrypt an external hard drive with LUKS on one machine, and connect it to another machine, I only need the encryption password to open and mount the drive. I do not need the configurations used to encrypt the partition initially.
It seems that the above workflow is not possible with rclone.
LUKS is much more limited then rclone using local folders
rclone works with dozens of cloud backends, local folders, can use multiple passwords, salts and so on.
so taking one-minute to create a rclone config is worth the effort.
I understand, and am not comparing the two tools. Sorry if it seemed like that. I am using rclone for all the benefits you mentioned. It is a great tool.
My comment was regarding the encryption workflow only and whether re-entering the configuration is the only way. The answer seems to be yes and it means that the rclone config file is an important file one should hold on to. Like a password pretty much. This is not what I had understood with my limited experience with rclone.
My impression was that the encryption password is the only important information I need to keep. It also tells me that I if I use rclone with encryption to back up my machine, I need to keep a separate copy of my rclone config file somewhere else.
Let's say one only has the password. While re-configuring the remote on a second machine, they respond How to encrypt the filenames. with standard, but when they were creating the encrypted remote, the answer was off. Would this cause any issues?