Try to make our PGP signing more useful:
[u/mdw/putty] / doc / pscp.but
1 \define{versionidpscp} \versionid $Id$
2
3 \#FIXME: Need examples
4
5 \C{pscp} Using PSCP to transfer files securely
6
7 \i{PSCP}, the PuTTY Secure Copy client, is a tool for transferring files
8 securely between computers using an SSH connection.
9
10 If you have an SSH-2 server, you might prefer PSFTP (see \k{psftp})
11 for interactive use. PSFTP does not in general work with SSH-1
12 servers, however.
13
14 \H{pscp-starting} Starting PSCP
15
16 PSCP is a command line application. This means that you cannot just
17 double-click on its icon to run it and instead you have to bring up a
18 \i{console window}. With Windows 95, 98, and ME, this is called an
19 \q{MS-DOS Prompt} and with Windows NT and 2000 it is called a
20 \q{Command Prompt}. It should be available from the Programs section
21 of your Start Menu.
22
23 To start PSCP it will need either to be on your \i{\c{PATH}} or in your
24 current directory. To add the directory containing PSCP to your
25 \c{PATH} environment variable, type into the console window:
26
27 \c set PATH=C:\path\to\putty\directory;%PATH%
28
29 This will only work for the lifetime of that particular console
30 window. To set your \c{PATH} more permanently on Windows NT, use the
31 Environment tab of the System Control Panel. On Windows 95, 98, and
32 ME, you will need to edit your \c{AUTOEXEC.BAT} to include a \c{set}
33 command like the one above.
34
35 \H{pscp-usage} PSCP Usage
36
37 Once you've got a console window to type into, you can just type
38 \c{pscp} on its own to bring up a usage message. This tells you the
39 version of PSCP you're using, and gives you a brief summary of how to
40 use PSCP:
41
42 \c Z:\owendadmin>pscp
43 \c PuTTY Secure Copy client
44 \c Release 0.XX
45 \c Usage: pscp [options] [user@]host:source target
46 \c pscp [options] source [source...] [user@]host:target
47 \c pscp [options] -ls [user@]host:filespec
48 \c Options:
49 \c -V print version information and exit
50 \c -pgpfp print PGP key fingerprints and exit
51 \c -p preserve file attributes
52 \c -q quiet, don't show statistics
53 \c -r copy directories recursively
54 \c -v show verbose messages
55 \c -load sessname Load settings from saved session
56 \c -P port connect to specified port
57 \c -l user connect with specified username
58 \c -pw passw login with specified password
59 \c -1 -2 force use of particular SSH protocol version
60 \c -4 -6 force use of IPv4 or IPv6
61 \c -C enable compression
62 \c -i key private key file for authentication
63 \c -batch disable all interactive prompts
64 \c -unsafe allow server-side wildcards (DANGEROUS)
65 \c -sftp force use of SFTP protocol
66 \c -scp force use of SCP protocol
67
68 (PSCP's interface is much like the Unix \c{scp} command, if you're
69 familiar with that.)
70
71 \S{pscp-usage-basics} The basics
72
73 To receive (a) file(s) from a remote server:
74
75 \c pscp [options] [user@]host:source target
76
77 So to copy the file \c{/etc/hosts} from the server \c{example.com} as
78 user \c{fred} to the file \c{c:\\temp\\example-hosts.txt}, you would type:
79
80 \c pscp fred@example.com:/etc/hosts c:\temp\example-hosts.txt
81
82 To send (a) file(s) to a remote server:
83
84 \c pscp [options] source [source...] [user@]host:target
85
86 So to copy the local file \c{c:\\documents\\foo.txt} to the server
87 \c{example.com} as user \c{fred} to the file \c{/tmp/foo} you would
88 type:
89
90 \c pscp c:\documents\foo.txt fred@example.com:/tmp/foo
91
92 You can use wildcards to transfer multiple files in either
93 direction, like this:
94
95 \c pscp c:\documents\*.doc fred@example.com:docfiles
96 \c pscp fred@example.com:source/*.c c:\source
97
98 However, in the second case (using a wildcard for multiple remote
99 files) you may see a warning saying something like \q{warning:
100 remote host tried to write to a file called \cq{terminal.c} when we
101 requested a file called \cq{*.c}. If this is a wildcard, consider
102 upgrading to SSH-2 or using the \cq{-unsafe} option. Renaming of
103 this file has been disallowed}.
104
105 This is due to a fundamental insecurity in the old-style SCP
106 protocol: the client sends the wildcard string (\c{*.c}) to the
107 server, and the server sends back a sequence of file names that
108 match the wildcard pattern. However, there is nothing to stop the
109 server sending back a \e{different} pattern and writing over one of
110 your other files: if you request \c{*.c}, the server might send back
111 the file name \c{AUTOEXEC.BAT} and install a virus for you. Since
112 the wildcard matching rules are decided by the server, the client
113 cannot reliably verify that the filenames sent back match the
114 pattern.
115
116 PSCP will attempt to use the newer SFTP protocol (part of SSH-2)
117 where possible, which does not suffer from this security flaw. If
118 you are talking to an SSH-2 server which supports SFTP, you will
119 never see this warning. (You can force use of the SFTP protocol,
120 if available, with \c{-sftp} - see \k{pscp-usage-options-backend}.)
121
122 If you really need to use a server-side wildcard with an SSH-1
123 server, you can use the \c{-unsafe} command line option with PSCP:
124
125 \c pscp -unsafe fred@example.com:source/*.c c:\source
126
127 This will suppress the warning message and the file transfer will
128 happen. However, you should be aware that by using this option you
129 are giving the server the ability to write to \e{any} file in the
130 target directory, so you should only use this option if you trust
131 the server administrator not to be malicious (and not to let the
132 server machine be cracked by malicious people). Alternatively, do
133 any such download in a newly created empty directory. (Even in
134 \q{unsafe} mode, PSCP will still protect you against the server
135 trying to get out of that directory using pathnames including
136 \cq{..}.)
137
138 \S2{pscp-usage-basics-user} \c{user}
139
140 The login name on the remote server. If this is omitted, and \c{host}
141 is a PuTTY saved session, PSCP will use any username specified by that
142 saved session. Otherwise, PSCP will attempt to use the local Windows
143 username.
144
145 \S2{pscp-usage-basics-host} \c{host}
146
147 The name of the remote server, or the name of an existing PuTTY saved
148 session. In the latter case, the session's settings for hostname, port
149 number, cipher type and username will be used.
150
151 \S2{pscp-usage-basics-source} \c{source}
152
153 One or more source files. \i{Wildcards} are allowed. The syntax of
154 wildcards depends on the system to which they apply, so if you are
155 copying \e{from} a Windows system \e{to} a UNIX system, you should use
156 Windows wildcard syntax (e.g. \c{*.*}), but if you are copying \e{from}
157 a UNIX system \e{to} a Windows system, you would use the wildcard
158 syntax allowed by your UNIX shell (e.g. \c{*}).
159
160 If the source is a remote server and you do not specify a full
161 pathname (in UNIX, a pathname beginning with a \c{/} (slash)
162 character), what you specify as a source will be interpreted relative
163 to your home directory on the remote server.
164
165 \S2{pscp-usage-basics-target} \c{target}
166
167 The filename or directory to put the file(s). When copying from a
168 remote server to a local host, you may wish simply to place the
169 file(s) in the current directory. To do this, you should specify a
170 target of \c{.}. For example:
171
172 \c pscp fred@example.com:/home/tom/.emacs .
173
174 ...would copy \c{/home/tom/.emacs} on the remote server to the current
175 directory.
176
177 As with the \c{source} parameter, if the target is on a remote server
178 and is not a full path name, it is interpreted relative to your home
179 directory on the remote server.
180
181 \S{pscp-usage-options} Options
182
183 PSCP accepts all the general command line options supported by the
184 PuTTY tools, except the ones which make no sense in a file transfer
185 utility. See \k{using-general-opts} for a description of these
186 options. (The ones not supported by PSCP are clearly marked.)
187
188 PSCP also supports some of its own options. The following sections
189 describe PSCP's specific command-line options.
190
191 These are the command line options that PSCP accepts.
192
193 \S2{pscp-usage-options-p}\c{-p} preserve file attributes
194
195 By default, files copied with PSCP are \i{timestamp}ed with the date and
196 time they were copied. The \c{-p} option preserves the original
197 timestamp on copied files.
198
199 \S2{pscp-usage-options-q}\c{-q} quiet, don't show \i{statistics}
200
201 By default, PSCP displays a meter displaying the progress of the
202 current transfer:
203
204 \c mibs.tar | 168 kB | 84.0 kB/s | ETA: 00:00:13 | 13%
205
206 The fields in this display are (from left to right), filename, size
207 (in kilobytes) of file transferred so far, estimate of how fast the
208 file is being transferred (in kilobytes per second), estimated time
209 that the transfer will be complete, and percentage of the file so far
210 transferred. The \c{-q} option to PSCP suppresses the printing of
211 these statistics.
212
213 \S2{pscp-usage-options-r}\c{-r} copies directories \i{recursive}ly
214
215 By default, PSCP will only copy files. Any directories you specify to
216 copy will be skipped, as will their contents. The \c{-r} option tells
217 PSCP to descend into any directories you specify, and to copy them and
218 their contents. This allows you to use PSCP to transfer whole
219 directory structures between machines.
220
221 \S2{pscp-usage-options-batch}\c{-batch} avoid interactive prompts
222
223 If you use the \c{-batch} option, PSCP will never give an
224 interactive prompt while establishing the connection. If the
225 server's host key is invalid, for example (see \k{gs-hostkey}), then
226 the connection will simply be abandoned instead of asking you what
227 to do next.
228
229 This may help PSCP's behaviour when it is used in automated
230 scripts: using \c{-batch}, if something goes wrong at connection
231 time, the batch job will fail rather than hang.
232
233 \S2{pscp-usage-options-backend}\c{-sftp}, \c{-scp} force use of
234 particular protocol
235
236 As mentioned in \k{pscp-usage-basics}, there are two different file
237 transfer protocols in use with SSH. Despite its name, PSCP (like many
238 other ostensible \cw{scp} clients) can use either of these protocols.
239
240 The older SCP protocol does not have a written specification and
241 leaves a lot of detail to the server platform. Wildcards are expanded
242 on the server. The simple design means that any wildcard specification
243 supported by the server platform (such as brace expansion) can be
244 used, but also leads to interoperability issues such as with filename
245 quoting (for instance, where filenames contain spaces), and also the
246 security issue described in \k{pscp-usage-basics}.
247
248 The newer SFTP protocol, which is usually associated with SSH-2
249 servers, is specified in a more platform independent way, and leaves
250 issues such as wildcard syntax up to the client. (PuTTY's SFTP
251 wildcard syntax is described in \k{psftp-wildcards}.) This makes it
252 more consistent across platforms, more suitable for scripting and
253 automation, and avoids security issues with wildcard matching.
254
255 Normally PSCP will attempt to use the SFTP protocol, and only fall
256 back to the SCP protocol if SFTP is not available on the server.
257
258 The \c{-scp} option forces PSCP to use the SCP protocol or quit.
259
260 The \c{-sftp} option forces PSCP to use the SFTP protocol or quit.
261 When this option is specified, PSCP looks harder for an SFTP server,
262 which may allow use of SFTP with SSH-1 depending on server setup.
263
264 \S{pscp-retval} Return value
265
266 PSCP returns an \cw{ERRORLEVEL} of zero (success) only if the files
267 were correctly transferred. You can test for this in a batch file,
268 using code such as this:
269
270 \c pscp file*.* user@hostname:
271 \c if errorlevel 1 echo There was an error
272
273 \S{pscp-pubkey} Using public key authentication with PSCP
274
275 Like PuTTY, PSCP can authenticate using a public key instead of a
276 password. There are three ways you can do this.
277
278 Firstly, PSCP can use PuTTY saved sessions in place of hostnames
279 (see \k{pscp-usage-basics-host}). So you would do this:
280
281 \b Run PuTTY, and create a PuTTY saved session (see
282 \k{config-saving}) which specifies your private key file (see
283 \k{config-ssh-privkey}). You will probably also want to specify a
284 username to log in as (see \k{config-username}).
285
286 \b In PSCP, you can now use the name of the session instead of a
287 hostname: type \c{pscp sessionname:file localfile}, where
288 \c{sessionname} is replaced by the name of your saved session.
289
290 Secondly, you can supply the name of a private key file on the command
291 line, with the \c{-i} option. See \k{using-cmdline-identity} for more
292 information.
293
294 Thirdly, PSCP will attempt to authenticate using Pageant if Pageant
295 is running (see \k{pageant}). So you would do this:
296
297 \b Ensure Pageant is running, and has your private key stored in it.
298
299 \b Specify a user and host name to PSCP as normal. PSCP will
300 automatically detect Pageant and try to use the keys within it.
301
302 For more general information on public-key authentication, see
303 \k{pubkey}.