Fix up documentation/usage messages for r6572.
[u/mdw/putty] / doc / pscp.but
CommitLineData
39a938f7 1\define{versionidpscp} \versionid $Id$
768ada0c 2
ded53fce 3\#FIXME: Need examples
768ada0c 4
421406a4 5\C{pscp} Using \i{PSCP} to transfer files securely
e5b0d077 6
421406a4 7\i{PSCP}, the PuTTY Secure Copy client, is a tool for \i{transferring files}
768ada0c 8securely between computers using an SSH connection.
9
2e85c969 10If you have an SSH-2 server, you might prefer PSFTP (see \k{psftp})
11for interactive use. PSFTP does not in general work with SSH-1
9a313f60 12servers, however.
13
768ada0c 14\H{pscp-starting} Starting PSCP
15
16PSCP is a command line application. This means that you cannot just
17double-click on its icon to run it and instead you have to bring up a
ffd64114 18\i{console window}. With Windows 95, 98, and ME, this is called an
421406a4 19\q{MS-DOS Prompt} and with Windows NT, 2000, and XP, it is called a
768ada0c 20\q{Command Prompt}. It should be available from the Programs section
421406a4 21of your \i{Start Menu}.
768ada0c 22
ffd64114 23To start PSCP it will need either to be on your \i{\c{PATH}} or in your
768ada0c 24current directory. To add the directory containing PSCP to your
25\c{PATH} environment variable, type into the console window:
26
8452efbc 27\c set PATH=C:\path\to\putty\directory;%PATH%
768ada0c 28
e35b2951 29This will only work for the lifetime of that particular console
421406a4 30window. To set your \c{PATH} more permanently on Windows NT, 2000,
31and XP, use the Environment tab of the System Control Panel. On
32Windows 95, 98, and ME, you will need to edit your \i\c{AUTOEXEC.BAT}
33to include a \c{set} command like the one above.
768ada0c 34
35\H{pscp-usage} PSCP Usage
36
37Once you've got a console window to type into, you can just type
38\c{pscp} on its own to bring up a usage message. This tells you the
39version of PSCP you're using, and gives you a brief summary of how to
40use PSCP:
41
42\c Z:\owendadmin>pscp
43\c PuTTY Secure Copy client
e5708bc7 44\c Release 0.XX
768ada0c 45\c Usage: pscp [options] [user@]host:source target
e2a197cf 46\c pscp [options] source [source...] [user@]host:target
db77dfb8 47\c pscp [options] -ls [user@]host:filespec
768ada0c 48\c Options:
2285d016 49\c -V print version information and exit
50\c -pgpfp print PGP key fingerprints and exit
768ada0c 51\c -p preserve file attributes
52\c -q quiet, don't show statistics
53\c -r copy directories recursively
54\c -v show verbose messages
e2a197cf 55\c -load sessname Load settings from saved session
768ada0c 56\c -P port connect to specified port
e2a197cf 57\c -l user connect with specified username
768ada0c 58\c -pw passw login with specified password
e2a197cf 59\c -1 -2 force use of particular SSH protocol version
05581745 60\c -4 -6 force use of IPv4 or IPv6
e2a197cf 61\c -C enable compression
62\c -i key private key file for authentication
e5708bc7 63\c -noagent disable use of Pageant
64\c -agent enable use of Pageant
e2a197cf 65\c -batch disable all interactive prompts
66\c -unsafe allow server-side wildcards (DANGEROUS)
728f4f4c 67\c -sftp force use of SFTP protocol
6e310bc2 68\c -scp force use of SCP protocol
768ada0c 69
70(PSCP's interface is much like the Unix \c{scp} command, if you're
71familiar with that.)
72
73\S{pscp-usage-basics} The basics
74
421406a4 75To \I{receiving files}receive (a) file(s) from a remote server:
768ada0c 76
ded53fce 77\c pscp [options] [user@]host:source target
78
0b06900c 79So to copy the file \c{/etc/hosts} from the server \c{example.com} as
80user \c{fred} to the file \c{c:\\temp\\example-hosts.txt}, you would type:
ded53fce 81
82\c pscp fred@example.com:/etc/hosts c:\temp\example-hosts.txt
768ada0c 83
421406a4 84To \I{sending files}send (a) file(s) to a remote server:
768ada0c 85
ded53fce 86\c pscp [options] source [source...] [user@]host:target
87
35cffede 88So to copy the local file \c{c:\\documents\\foo.txt} to the server
89\c{example.com} as user \c{fred} to the file \c{/tmp/foo} you would
90type:
ded53fce 91
35cffede 92\c pscp c:\documents\foo.txt fred@example.com:/tmp/foo
768ada0c 93
421406a4 94You can use \i{wildcards} to transfer multiple files in either
a4196579 95direction, like this:
96
97\c pscp c:\documents\*.doc fred@example.com:docfiles
98\c pscp fred@example.com:source/*.c c:\source
99
100However, in the second case (using a wildcard for multiple remote
35cffede 101files) you may see a warning saying something like \q{warning:
9097913f 102remote host tried to write to a file called \cq{terminal.c} when we
103requested a file called \cq{*.c}. If this is a wildcard, consider
2e85c969 104upgrading to SSH-2 or using the \cq{-unsafe} option. Renaming of
9097913f 105this file has been disallowed}.
a4196579 106
421406a4 107This is due to a \I{security risk}fundamental insecurity in the old-style
108\i{SCP protocol}: the client sends the wildcard string (\c{*.c}) to the
a4196579 109server, and the server sends back a sequence of file names that
110match the wildcard pattern. However, there is nothing to stop the
111server sending back a \e{different} pattern and writing over one of
112your other files: if you request \c{*.c}, the server might send back
113the file name \c{AUTOEXEC.BAT} and install a virus for you. Since
114the wildcard matching rules are decided by the server, the client
115cannot reliably verify that the filenames sent back match the
116pattern.
117
421406a4 118PSCP will attempt to use the newer \i{SFTP} protocol (part of SSH-2)
a4196579 119where possible, which does not suffer from this security flaw. If
2e85c969 120you are talking to an SSH-2 server which supports SFTP, you will
728f4f4c 121never see this warning. (You can force use of the SFTP protocol,
122if available, with \c{-sftp} - see \k{pscp-usage-options-backend}.)
a4196579 123
2e85c969 124If you really need to use a server-side wildcard with an SSH-1
421406a4 125server, you can use the \i\c{-unsafe} command line option with PSCP:
a4196579 126
127\c pscp -unsafe fred@example.com:source/*.c c:\source
128
129This will suppress the warning message and the file transfer will
130happen. However, you should be aware that by using this option you
131are giving the server the ability to write to \e{any} file in the
132target directory, so you should only use this option if you trust
133the server administrator not to be malicious (and not to let the
9097913f 134server machine be cracked by malicious people). Alternatively, do
135any such download in a newly created empty directory. (Even in
136\q{unsafe} mode, PSCP will still protect you against the server
137trying to get out of that directory using pathnames including
138\cq{..}.)
a4196579 139
ffd64114 140\S2{pscp-usage-basics-user} \c{user}
141
421406a4 142The \i{login name} on the remote server. If this is omitted, and \c{host}
ffd64114 143is a PuTTY saved session, PSCP will use any username specified by that
144saved session. Otherwise, PSCP will attempt to use the local Windows
145username.
146
421406a4 147\S2{pscp-usage-basics-host} \I{hostname}\c{host}
ffd64114 148
149The name of the remote server, or the name of an existing PuTTY saved
150session. In the latter case, the session's settings for hostname, port
151number, cipher type and username will be used.
768ada0c 152
ffd64114 153\S2{pscp-usage-basics-source} \c{source}
768ada0c 154
421406a4 155One or more source files. \ii{Wildcards} are allowed. The syntax of
ffd64114 156wildcards depends on the system to which they apply, so if you are
157copying \e{from} a Windows system \e{to} a UNIX system, you should use
116934a6 158Windows wildcard syntax (e.g. \c{*.*}), but if you are copying \e{from}
ffd64114 159a UNIX system \e{to} a Windows system, you would use the wildcard
160syntax allowed by your UNIX shell (e.g. \c{*}).
768ada0c 161
ded53fce 162If the source is a remote server and you do not specify a full
163pathname (in UNIX, a pathname beginning with a \c{/} (slash)
164character), what you specify as a source will be interpreted relative
421406a4 165to your \i{home directory} on the remote server.
ded53fce 166
ffd64114 167\S2{pscp-usage-basics-target} \c{target}
768ada0c 168
ded53fce 169The filename or directory to put the file(s). When copying from a
170remote server to a local host, you may wish simply to place the
171file(s) in the current directory. To do this, you should specify a
172target of \c{.}. For example:
173
174\c pscp fred@example.com:/home/tom/.emacs .
175
176...would copy \c{/home/tom/.emacs} on the remote server to the current
177directory.
178
179As with the \c{source} parameter, if the target is on a remote server
180and is not a full path name, it is interpreted relative to your home
181directory on the remote server.
768ada0c 182
183\S{pscp-usage-options} Options
184
e117a742 185PSCP accepts all the general command line options supported by the
186PuTTY tools, except the ones which make no sense in a file transfer
187utility. See \k{using-general-opts} for a description of these
188options. (The ones not supported by PSCP are clearly marked.)
189
190PSCP also supports some of its own options. The following sections
191describe PSCP's specific command-line options.
192
ffd64114 193These are the command line options that PSCP accepts.
768ada0c 194
421406a4 195\S2{pscp-usage-options-ls}\I{-ls-PSCP}\c{-ls} \I{listing files}list remote files
196
197If the \c{-ls} option is given, no files are transferred; instead,
198remote files are listed. Only a hostname specification and
199optional remote file specification need be given. For example:
200
201\c pscp -ls fred@example.com:dir1
202
203The SCP protocol does not contain within itself a means of listing
204files. If SCP is in use, this option therefore assumes that the
f50fa177 205server responds appropriately to the command \c{ls\_-la};
206this may not work with all servers.
421406a4 207
208If SFTP is in use, this option should work with all servers.
209
210\S2{pscp-usage-options-p}\I{-p-PSCP}\c{-p} \i{preserve file attributes}
768ada0c 211
ffd64114 212By default, files copied with PSCP are \i{timestamp}ed with the date and
768ada0c 213time they were copied. The \c{-p} option preserves the original
214timestamp on copied files.
215
421406a4 216\S2{pscp-usage-options-q}\I{-q-PSCP}\c{-q} quiet, don't show \i{statistics}
768ada0c 217
218By default, PSCP displays a meter displaying the progress of the
219current transfer:
220
35cffede 221\c mibs.tar | 168 kB | 84.0 kB/s | ETA: 00:00:13 | 13%
768ada0c 222
223The fields in this display are (from left to right), filename, size
224(in kilobytes) of file transferred so far, estimate of how fast the
225file is being transferred (in kilobytes per second), estimated time
226that the transfer will be complete, and percentage of the file so far
227transferred. The \c{-q} option to PSCP suppresses the printing of
228these statistics.
229
421406a4 230\S2{pscp-usage-options-r}\I{-r-PSCP}\c{-r} copies directories \i{recursive}ly
768ada0c 231
b3fa9b5e 232By default, PSCP will only copy files. Any directories you specify to
233copy will be skipped, as will their contents. The \c{-r} option tells
234PSCP to descend into any directories you specify, and to copy them and
235their contents. This allows you to use PSCP to transfer whole
236directory structures between machines.
237
421406a4 238\S2{pscp-usage-options-batch}\I{-batch-PSCP}\c{-batch} avoid interactive prompts
ff2ae367 239
240If you use the \c{-batch} option, PSCP will never give an
241interactive prompt while establishing the connection. If the
242server's host key is invalid, for example (see \k{gs-hostkey}), then
243the connection will simply be abandoned instead of asking you what
244to do next.
245
246This may help PSCP's behaviour when it is used in automated
247scripts: using \c{-batch}, if something goes wrong at connection
248time, the batch job will fail rather than hang.
249
421406a4 250\S2{pscp-usage-options-backend}\i\c{-sftp}, \i\c{-scp} force use of
728f4f4c 251particular protocol
252
253As mentioned in \k{pscp-usage-basics}, there are two different file
254transfer protocols in use with SSH. Despite its name, PSCP (like many
255other ostensible \cw{scp} clients) can use either of these protocols.
256
421406a4 257The older \i{SCP protocol} does not have a written specification and
258leaves a lot of detail to the server platform. \ii{Wildcards} are expanded
728f4f4c 259on the server. The simple design means that any wildcard specification
260supported by the server platform (such as brace expansion) can be
261used, but also leads to interoperability issues such as with filename
262quoting (for instance, where filenames contain spaces), and also the
263security issue described in \k{pscp-usage-basics}.
264
421406a4 265The newer \i{SFTP} protocol, which is usually associated with SSH-2
728f4f4c 266servers, is specified in a more platform independent way, and leaves
9d210cac 267issues such as wildcard syntax up to the client. (PuTTY's SFTP
268wildcard syntax is described in \k{psftp-wildcards}.) This makes it
269more consistent across platforms, more suitable for scripting and
270automation, and avoids security issues with wildcard matching.
728f4f4c 271
272Normally PSCP will attempt to use the SFTP protocol, and only fall
273back to the SCP protocol if SFTP is not available on the server.
274
275The \c{-scp} option forces PSCP to use the SCP protocol or quit.
276
277The \c{-sftp} option forces PSCP to use the SFTP protocol or quit.
278When this option is specified, PSCP looks harder for an SFTP server,
2e85c969 279which may allow use of SFTP with SSH-1 depending on server setup.
728f4f4c 280
421406a4 281\S{pscp-retval} \ii{Return value}
a4196579 282
421406a4 283PSCP returns an \i\cw{ERRORLEVEL} of zero (success) only if the files
284were correctly transferred. You can test for this in a \i{batch file},
a4196579 285using code such as this:
286
287\c pscp file*.* user@hostname:
288\c if errorlevel 1 echo There was an error
289
421406a4 290\S{pscp-pubkey} Using \i{public key authentication} with PSCP
6da38567 291
292Like PuTTY, PSCP can authenticate using a public key instead of a
e2a197cf 293password. There are three ways you can do this.
6da38567 294
295Firstly, PSCP can use PuTTY saved sessions in place of hostnames
296(see \k{pscp-usage-basics-host}). So you would do this:
297
298\b Run PuTTY, and create a PuTTY saved session (see
299\k{config-saving}) which specifies your private key file (see
add788fc 300\k{config-ssh-privkey}). You will probably also want to specify a
301username to log in as (see \k{config-username}).
6da38567 302
303\b In PSCP, you can now use the name of the session instead of a
edcbf00a 304hostname: type \c{pscp sessionname:file localfile}, where
305\c{sessionname} is replaced by the name of your saved session.
6da38567 306
e2a197cf 307Secondly, you can supply the name of a private key file on the command
308line, with the \c{-i} option. See \k{using-cmdline-identity} for more
309information.
310
311Thirdly, PSCP will attempt to authenticate using Pageant if Pageant
6da38567 312is running (see \k{pageant}). So you would do this:
313
314\b Ensure Pageant is running, and has your private key stored in it.
315
316\b Specify a user and host name to PSCP as normal. PSCP will
317automatically detect Pageant and try to use the keys within it.
318
319For more general information on public-key authentication, see
320\k{pubkey}.