Steven Shockley points out that the .PPK extension is far from obvious to
[u/mdw/putty] / doc / using.but
1 \versionid $Id: using.but,v 1.11 2003/01/16 15:43:18 jacob Exp $
2
3 \C{using} Using PuTTY
4
5 This chapter provides a general introduction to some more advanced
6 features of PuTTY. For extreme detail and reference purposes,
7 \k{config} is likely to contain more information.
8
9 \H{using-session} During your session
10
11 A lot of PuTTY's complexity and features are in the configuration
12 panel. Once you have worked your way through that and started
13 a session, things should be reasonably simple after that.
14 Nevertheless, there are a few more useful features available.
15
16 \S{using-selection} Copying and pasting text
17
18 Often in a PuTTY session you will find text on your terminal screen
19 which you want to type in again. Like most other terminal emulators,
20 PuTTY allows you to copy and paste the text rather than having to
21 type it again. Also, copy and paste uses the Windows clipboard, so
22 that you can paste (for example) URLs into a web browser, or paste
23 from a word processor or spreadsheet into your terminal session.
24
25 PuTTY's copy and paste works entirely with the mouse. In order to
26 copy text to the clipboard, you just click the left mouse button in
27 the terminal window, and drag to select text. When you let go of the
28 button, the text is \e{automatically} copied to the clipboard. You
29 do not need to press Ctrl-C or Ctrl-Ins; in fact, if you do press
30 Ctrl-C, PuTTY will send a Ctrl-C character down your session to the
31 server where it will probably cause a process to be interrupted.
32
33 Pasting is done using the right button (or the middle mouse button,
34 if you have a three-button mouse and have set it up; see
35 \k{config-mouse}). Pressing Shift-Ins has the same effect.
36 When you click the right mouse button, PuTTY will
37 read whatever is in the Windows Clipboard and paste it into your
38 session, \e{exactly} as if it had been typed at the keyboard.
39 (Therefore, be careful of pasting formatted text into an editor that
40 does automatic indenting; you may find that the spaces pasted from
41 the clipboard plus the spaces added by the editor add up to too many
42 spaces and ruin the formatting. There is nothing PuTTY can do about
43 this.)
44
45 If you double-click the left mouse button, PuTTY will select a whole
46 word. If you double-click, hold down the second click, and drag the
47 mouse, PuTTY will select a sequence of whole words. (You can adjust
48 precisely what PuTTY considers to be part of a word; see
49 \k{config-charclasses}.) If you \e{triple}-click, or triple-click
50 and drag, then PuTTY will select a whole line or sequence of lines.
51
52 If you want to select a rectangular region instead of selecting to
53 the end of each line, you can do this by holding down Alt when you
54 make your selection. (You can also configure rectangular selection
55 to be the default, and then holding down Alt gives the normal
56 behaviour instead. See \k{config-rectselect} for details.)
57
58 If you have a middle mouse button, then you can use it to adjust an
59 existing selection if you selected something slightly wrong. (If you
60 have configured the middle mouse button to paste, then the right
61 mouse button does this instead.) Click the button on the screen, and
62 you can pick up the nearest end of the selection and drag it to
63 somewhere else.
64
65 \S{using-scrollback} Scrolling the screen back
66
67 PuTTY keeps track of text that has scrolled up off the top of the
68 terminal. So if something appears on the screen that you want to
69 read, but it scrolls too fast and it's gone by the time you try to
70 look for it, you can use the scrollbar on the right side of the
71 window to look back up the session history and find it again.
72
73 As well as using the scrollbar, you can also page the scrollback up
74 and down by pressing Shift-PgUp and Shift-PgDn. These are still
75 available if you configure the scrollbar to be invisible.
76
77 By default the last 200 lines scrolled off the top are
78 preserved for you to look at. You can increase (or decrease) this
79 value using the configuration box; see \k{config-scrollback}.
80
81 \S{using-sysmenu} The System menu
82
83 If you click the left mouse button on the icon in the top left
84 corner of PuTTY's window, or click the right mouse button on the
85 title bar, you will see the standard Windows system menu containing
86 items like Minimise, Move, Size and Close.
87
88 PuTTY's system menu contains extra program features in addition to
89 the Windows standard options. These extra menu commands are
90 described below.
91
92 \S2{using-eventlog} The PuTTY Event Log
93
94 If you choose \q{Event Log} from the system menu, a small window
95 will pop up in which PuTTY logs significant events during the
96 connection. Most of the events in the log will probably take place
97 during session startup, but a few can occur at any point in the
98 session, and one or two occur right at the end.
99
100 You can use the mouse to select one or more lines of the Event Log,
101 and hit the Copy button to copy them to the clipboard. If you are
102 reporting a bug, it's often useful to paste the contents of the
103 Event Log into your bug report.
104
105 \S2{using-newsession} Starting new sessions
106
107 PuTTY's system menu provides some shortcut ways to start new
108 sessions:
109
110 \b Selecting \q{New Session} will start a completely new instance of
111 PuTTY, and bring up the configuration box as normal.
112
113 \b Selecting \q{Duplicate Session} will start a session with
114 precisely the same options as your current one - connecting to the
115 same host using the same protocol, with all the same terminal
116 settings and everything.
117
118 \b The \q{Saved Sessions} submenu gives you quick access to any
119 sets of stored session details you have previously saved. See
120 \k{config-saving} for details of how to create saved sessions.
121
122 \S2{using-changesettings} Changing your session settings
123
124 If you select \q{Change Settings} from the system menu, PuTTY will
125 display a cut-down version of its initial configuration box. This
126 allows you to adjust most properties of your current session. You
127 can change the terminal size, the font, the actions of various
128 keypresses, the colours, and so on.
129
130 Some of the options that are available in the main configuration box
131 are not shown in the cut-down Change Settings box. These are usually
132 options which don't make sense to change in the middle of a session
133 (for example, you can't switch from SSH to Telnet in mid-session).
134
135 \S2{using-copyall} Copy All to Clipboard
136
137 This system menu option provides a convenient way to copy the whole
138 contents of the terminal screen and scrollback to the clipboard in
139 one go.
140
141 \S2{reset-terminal} Clearing and resetting the terminal
142
143 The \q{Clear Scrollback} option on the system menu tells PuTTY to
144 discard all the lines of text that have been kept after they
145 scrolled off the top of the screen. This might be useful, for
146 example, if you displayed sensitive information and wanted to make
147 sure nobody could look over your shoulder and see it. (Note that
148 this only prevents a casual user from using the scrollbar to view
149 the information; the text is not guaranteed not to still be in
150 PuTTY's memory.)
151
152 The \q{Reset Terminal} option causes a full reset of the terminal
153 emulation. A VT-series terminal is a complex piece of software and
154 can easily get into a state where all the text printed becomes
155 unreadable. (This can happen, for example, if you accidentally
156 output a binary file to your terminal.) If this happens, selecting
157 Reset Terminal should sort it out.
158
159 \S2{using-fullscreen} Full screen mode
160
161 If you find the title bar on a maximised window to be ugly or
162 distracting, you can select Full Screen mode to maximise PuTTY
163 \q{even more}. When you select this, PuTTY will expand to fill the
164 whole screen and its borders, title bar and scrollbar will
165 disappear. (You can configure the scrollbar not to disappear in
166 full-screen mode if you want to keep it; see \k{config-scrollback}.)
167
168 When you are in full-screen mode, you can still access the system
169 menu if you click the left mouse button in the \e{extreme} top left
170 corner of the screen.
171
172 \H{using-logging} Creating a log file of your session
173
174 For some purposes you may find you want to log everything that
175 appears on your screen. You can do this using the \q{Logging} panel
176 in the configuration box.
177
178 To begin a session log, select \q{Change Settings} from the system
179 menu and go to the Logging panel. Enter a log file name, and select
180 a logging mode. (You can log all session output including the
181 terminal control sequences, or you can just log the printable text.
182 It depends what you want the log for.) Click \q{Apply} and your log
183 will be started. Later on, you can go back to the Logging panel and
184 select \q{Logging turned off completely} to stop logging; then PuTTY
185 will close the log file and you can safely read it.
186
187 See \k{config-logging} for more details and options.
188
189 \H{using-translation} Altering your character set configuration
190
191 If you find that special characters (accented characters, for
192 example) are not being displayed correctly in your PuTTY session, it
193 may be that PuTTY is interpreting the characters sent by the server
194 according to the wrong \e{character set}. There are a lot of
195 different character sets available, so it's entirely possible for
196 this to happen.
197
198 If you click \q{Change Settings} and look at the \q{Translation}
199 panel, you should see a large number of character sets which you can
200 select. Now all you need is to find out which of them you want!
201
202 \H{using-x-forwarding} Using X11 forwarding in SSH
203
204 The SSH protocol has the ability to securely forward X Window System
205 applications over your encrypted SSH connection, so that you can run
206 an application on the SSH server machine and have it put its windows
207 up on your local machine without sending any X network traffic in
208 the clear.
209
210 In order to use this feature, you will need an X display server for
211 your Windows machine, such as X-Win32 or Exceed. This will probably
212 install itself as display number 0 on your local machine; if it
213 doesn't, the manual for the X server should tell you what it does
214 do.
215
216 You should then tick the \q{Enable X11 forwarding} box in the
217 Tunnels panel (see \k{config-ssh-x11}) before starting your SSH
218 session. The \q{X display location} box reads \c{localhost:0} by
219 default, which is the usual display location where your X server
220 will be installed. If that needs changing, then change it.
221
222 Now you should be able to log in to the SSH server as normal. To
223 check that X forwarding has been successfully negotiated during
224 connection startup, you can check the PuTTY Event Log (see
225 \k{using-eventlog}). It should say something like this:
226
227 \c 2001-12-05 17:22:01 Requesting X11 forwarding
228 \c 2001-12-05 17:22:02 X11 forwarding enabled
229
230 If the remote system is Unix or Unix-like, you should also be able
231 to see that the \c{DISPLAY} environment variable has been set to
232 point at display 10 or above on the SSH server machine itself:
233
234 \c fred@unixbox:~$ echo $DISPLAY
235 \c unixbox:10.0
236
237 If this works, you should then be able to run X applications in the
238 remote session and have them display their windows on your PC.
239
240 Note that if your PC X server requires authentication to connect,
241 then PuTTY cannot currently support it. If this is a problem for
242 you, you should mail the authors \#{FIXME} and give details.
243
244 \H{using-port-forwarding} Using port forwarding in SSH
245
246 The SSH protocol has the ability to forward arbitrary network
247 connections over your encrypted SSH connection, to avoid the network
248 traffic being sent in clear. For example, you could use this to
249 connect from your home computer to a POP-3 server on a remote
250 machine without your POP-3 password being visible to network
251 sniffers.
252
253 In order to use port forwarding to connect from your local machine
254 to a port on a remote server, you need to:
255
256 \b Choose a port number on your local machine where PuTTY should
257 listen for incoming connections. There are likely to be plenty of
258 unused port numbers above 3000. (You can also use a local loopback
259 address here; see \k{config-ssh-portfwd} for more details.)
260
261 \b Now, before you start your SSH connection, go to the Tunnels
262 panel (see \k{config-ssh-portfwd}). Make sure the \q{Local} radio
263 button is set. Enter the local port number into the \q{Source port}
264 box. Enter the destination host name and port number into the
265 \q{Destination} box, separated by a colon (for example,
266 \c{popserver.example.com:110} to connect to a POP-3 server).
267
268 \b Now click the \q{Add} button. The details of your port forwarding
269 should appear in the list box.
270
271 Now start your session and log in. (Port forwarding will not be
272 enabled until after you have logged in; otherwise it would be easy
273 to perform completely anonymous network attacks, and gain access to
274 anyone's virtual private network). To check that PuTTY has set up
275 the port forwarding correctly, you can look at the PuTTY Event Log
276 (see \k{using-eventlog}). It should say something like this:
277
278 \c 2001-12-05 17:22:10 Local port 3110 forwarding to
279 \c popserver.example.com:110
280
281 Now if you connect to the source port number on your local PC, you
282 should find that it answers you exactly as if it were the service
283 running on the destination machine. So in this example, you could
284 then configure an e-mail client to use \c{localhost:3110} as a POP-3
285 server instead of \c{popserver.example.com:110}. (Of course, the
286 forwarding will stop happening when your PuTTY session closes down.)
287
288 You can also forward ports in the other direction: arrange for a
289 particular port number on the \e{server} machine to be forwarded
290 back to your PC as a connection to a service on your PC or near it.
291 To do this, just select the \q{Remote} radio button instead of the
292 \q{Local} one. The \q{Source port} box will now specify a port
293 number on the \e{server} (note that most servers will not allow you
294 to use port numbers under 1024 for this purpose).
295
296 The source port for a forwarded connection usually does not accept
297 connections from any machine except the SSH client or server machine
298 itself (for local and remote forwardings respectively). There are
299 controls in the Tunnels panel to change this:
300
301 \b The \q{Local ports accept connections from other hosts} option
302 allows you to set up local-to-remote port forwardings in such a way
303 that machines other than your client PC can connect to the forwarded
304 port.
305
306 \b The \q{Remote ports do the same} option does the same thing for
307 remote-to-local port forwardings (so that machines other than the
308 SSH server machine can connect to the forwarded port.) Note that
309 this feature is only available in the SSH 2 protocol, and not all
310 SSH 2 servers support it (OpenSSH 3.0 does not, for example).
311
312 \H{using-rawprot} Making raw TCP connections
313
314 A lot of Internet protocols are composed of commands and responses
315 in plain text. For example, SMTP (the protocol used to transfer
316 e-mail), NNTP (the protocol used to transfer Usenet news), and HTTP
317 (the protocol used to serve Web pages) all consist of commands in
318 readable plain text.
319
320 Sometimes it can be useful to connect directly to one of these
321 services and speak the protocol \q{by hand}, by typing protocol
322 commands and watching the responses. On Unix machines, you can do
323 this using the system's \c{telnet} command to connect to the right
324 port number. For example, \c{telnet mailserver.example.com 25} might
325 enable you to talk directly to the SMTP service running on a mail
326 server.
327
328 Although the Unix \c{telnet} program provides this functionality,
329 the protocol being used is not really Telnet. Really there is no
330 actual protocol at all; the bytes sent down the connection are
331 exactly the ones you type, and the bytes shown on the screen are
332 exactly the ones sent by the server. Unix \c{telnet} will attempt to
333 detect or guess whether the service it is talking to is a real
334 Telnet service or not; PuTTY prefers to be told for certain.
335
336 In order to make a debugging connection to a service of this type,
337 you simply select the fourth protocol name, \q{Raw}, from the
338 \q{Protocol} buttons in the \q{Session} configuration panel. (See
339 \k{config-hostname}.) You can then enter a host name and a port
340 number, and make the connection.
341
342 \H{using-cmdline} The PuTTY command line
343
344 PuTTY can be made to do various things without user intervention by
345 supplying command-line arguments (e.g., from a command prompt window,
346 or a Windows shortcut).
347
348 \S{using-cmdline-session} Starting a session from the command line
349
350 These options allow you to bypass the configuration window and launch
351 straight into a session.
352
353 To start a connection to a server called \c{host}:
354
355 \c putty.exe [-ssh | -telnet | -rlogin | -raw] [user@]host
356
357 If this syntax is used, settings are taken from the Default Settings
358 (see \k{config-saving}); \c{user} overrides these settings if
359 supplied. Also, you can specify a protocol, which will override the
360 default protocol (see \k{using-cmdline-protocol}).
361
362 For telnet sessions, the following alternative syntax is supported
363 (this makes PuTTY suitable for use as a URL handler for telnet URLs in
364 web browsers):
365
366 \c putty.exe telnet://host[:port]/
367
368 In order to start an existing saved session called \c{sessionname},
369 use the \c{-load} option (described in \k{using-cmdline-load}).
370
371 \c putty.exe -load "session name"
372
373 \S{using-cleanup} \c{-cleanup}
374
375 If invoked with the \c{-cleanup} option, rather than running as
376 normal, PuTTY will remove its registry entries and random seed file
377 from the local machine (after confirming with the user).
378
379 \S{using-general-opts} Standard command-line options
380
381 PuTTY and its associated tools support a range of command-line
382 options, most of which are consistent across all the tools. This
383 section lists the available options in all tools. Options which are
384 specific to a particular tool are covered in the chapter about that
385 tool.
386
387 \S2{using-cmdline-load} \c{-load}: load a saved session
388
389 The \c{-load} option causes PuTTY to load configuration details out
390 of a saved session. If these details include a host name, then this
391 option is all you need to make PuTTY start a session (although Plink
392 still requires an explicitly specified host name).
393
394 You need double quotes around the session name if it contains spaces.
395
396 If you want to create a Windows shortcut to start a PuTTY saved
397 session, this is the option you should use: your shortcut should
398 call something like
399
400 \c d:\path\to\putty.exe -load "my session"
401
402 (Note that PuTTY itself supports an alternative form of this option,
403 for backwards compatibility. If you execute \c{putty @sessionname}
404 it will have the same effect as \c{putty -load "sessionname"}. With
405 the \c{@} form, no double quotes are required, and the \c{@} sign
406 must be the very first thing on the command line. This form of the
407 option is deprecated.)
408
409 \S2{using-cmdline-protocol} Selecting a protocol: \c{-ssh},
410 \c{-telnet}, \c{-rlogin}, \c{-raw}
411
412 To choose which protocol you want to connect with, you can use one
413 of these options:
414
415 \b \c{-ssh} selects the SSH protocol.
416
417 \b \c{-telnet} selects the Telnet protocol.
418
419 \b \c{-rlogin} selects the Rlogin protocol.
420
421 \b \c{-raw} selects the raw protocol.
422
423 These options are not available in the file transfer tools PSCP and
424 PSFTP (which only work with the SSH protocol).
425
426 These options are equivalent to the protocol selection buttons in
427 the Session panel of the PuTTY configuration box (see
428 \k{config-hostname}).
429
430 \S2{using-cmdline-v} \c{-v}: increase verbosity
431
432 Most of the PuTTY tools can be made to tell you more about what they
433 are doing by supplying the \c{-v} option. If you are having trouble
434 when making a connection, or you're simply curious, you can turn
435 this switch on and hope to find out more about what is happening.
436
437 \S2{using-cmdline-l} \c{-l}: specify a login name
438
439 You can specify the user name to log in as on the remote server
440 using the \c{-l} option. For example, \c{plink login.example.com -l
441 fred}.
442
443 These options are equivalent to the username selection box in the
444 Connection panel of the PuTTY configuration box (see
445 \k{config-username}).
446
447 \S2{using-cmdline-portfwd} \c{-L} and \c{-R}: set up port forwardings
448
449 As well as setting up port forwardings in the PuTTY configuration
450 (see \k{config-ssh-portfwd}), you can also set up forwardings on the
451 command line. The command-line options work just like the ones in
452 Unix \c{ssh} programs.
453
454 To forward a local port (say 5110) to a remote destination (say
455 \cw{popserver.example.com} port 110), you can write something like
456 one of these:
457
458 \c putty -L 5110:popserver.example.com:110 -load mysession
459 \c plink mysession -L 5110:popserver.example.com:110
460
461 And to forward a remote port to a local destination, just use the
462 \c{-R} option instead of \c{-L}:
463
464 \c putty -R 5023:mytelnetserver.myhouse.org:23 -load mysession
465 \c plink mysession -R 5023:mytelnetserver.myhouse.org:23
466
467 For general information on port forwarding, see
468 \k{using-port-forwarding}.
469
470 These options are not available in the file transfer tools PSCP and
471 PSFTP.
472
473 \S2{using-cmdline-m} \c{-m}: read a remote command or script from a
474 file
475
476 The \c{-m} option performs a similar function to the \q{Remote
477 command} box in the SSH panel of the PuTTY configuration box (see
478 \k{config-command}). However, the \c{-m} option expects to be given
479 a file name, and it will read a command from that file. On most Unix
480 systems, you can even put multiple lines in this file and execute
481 more than one command in sequence, or a whole shell script.
482
483 This option is not available in the file transfer tools PSCP and
484 PSFTP.
485
486 \S2{using-cmdline-p} \c{-P}: specify a port number
487
488 The \c{-P} option is used to specify the port number to connect to. If
489 you have a Telnet server running on port 9696 of a machine instead of
490 port 23, for example:
491
492 \c putty -telnet -P 9696 host.name
493 \c plink -telnet -P 9696 host.name
494
495 (Note that this option is more useful in Plink than in PuTTY,
496 because in PuTTY you can write \c{putty -telnet host.name 9696} in
497 any case.)
498
499 These options are equivalent to the protocol selection buttons in
500 the Session panel of the PuTTY configuration box (see
501 \k{config-hostname}).
502
503 \S2{using-cmdline-pw} \c{-pw}: specify a password
504
505 A simple way to automate a remote login is to supply your password
506 on the command line. This is \e{not recommended} for reasons of
507 security. If you possibly can, we recommend you set up public-key
508 authentication instead. See \k{pubkey} for details.
509
510 Note that the \c{-pw} option only works when you are using the SSH
511 protocol. Due to fundamental limitations of Telnet and Rlogin, these
512 protocols do not support automated password authentication.
513
514 \S2{using-cmdline-agent} \c{-A} and \c{-a}: control agent forwarding
515
516 The \c{-A} option turns on SSH agent forwarding, and \c{-a} turns it
517 off. These options are only meaningful if you are using SSH.
518
519 See \k{pageant} for general information on Pageant, and
520 \k{pageant-forward} for information on agent forwarding. Note that
521 there is a security risk involved with enabling this option; see
522 \k{pageant-security} for details.
523
524 These options are equivalent to the agent forwarding checkbox in the
525 Auth panel of the PuTTY configuration box (see \k{config-ssh-agentfwd}).
526
527 These options are not available in the file transfer tools PSCP and
528 PSFTP.
529
530 \S2{using-cmdline-x11} \c{-X} and \c{-x}: control X11 forwarding
531
532 The \c{-X} option turns on X11 forwarding in SSH, and \c{-x} turns
533 it off. These options are only meaningful if you are using SSH.
534
535 For information on X11 forwarding, see \k{using-x-forwarding}.
536
537 These options are equivalent to the X11 forwarding checkbox in the
538 Tunnels panel of the PuTTY configuration box (see
539 \k{config-ssh-x11}).
540
541 These options are not available in the file transfer tools PSCP and
542 PSFTP.
543
544 \S2{using-cmdline-pty} \c{-t} and \c{-T}: control pseudo-terminal
545 allocation
546
547 The \c{-t} option ensures PuTTY attempts to allocate a
548 pseudo-terminal at the server, and \c{-T} stops it from allocating
549 one. These options are only meaningful if you are using SSH.
550
551 These options are equivalent to the \q{Don't allocate a
552 pseudo-terminal} checkbox in the SSH panel of the PuTTY
553 configuration box (see \k{config-ssh-pty}).
554
555 These options are not available in the file transfer tools PSCP and
556 PSFTP.
557
558 \S2{using-cmdline-compress} \c{-C}: enable compression
559
560 The \c{-C} option enables compression of the data sent across the
561 network. This option is only meaningful if you are using SSH.
562
563 This option is equivalent to the \q{Enable compression} checkbox in
564 the SSH panel of the PuTTY configuration box (see
565 \k{config-ssh-comp}).
566
567 \S2{using-cmdline-sshprot} \c{-1} and \c{-2}: specify an SSH protocol
568 version
569
570 The \c{-1} and \c{-2} options force PuTTY to use version 1 or
571 version 2 of the SSH protocol. These options are only meaningful if
572 you are using SSH.
573
574 These options are equivalent to selecting your preferred SSH
575 protocol version as \q{1 only} or \q{2 only} in the SSH panel of the
576 PuTTY configuration box (see \k{config-ssh-prot}).
577
578 \S2{using-cmdline-identity} \c{-i}: specify an SSH private key
579
580 The \c{-i} option allows you to specify the name of a private key
581 file in \c{*.PPK} format which PuTTY will use to authenticate with the
582 server. This option is only meaningful if you are using SSH.
583
584 For general information on public-key authentication, see \k{pubkey}.
585
586 This option is equivalent to the \q{Private key file for
587 authentication} box in the Auth panel of the PuTTY configuration box
588 (see \k{config-ssh-privkey}).