+\versionid $Id: gs.but,v 1.5 2001/11/25 17:32:39 simon Exp $
+
\C{gs} Getting started with PuTTY
This chapter gives a quick guide to the simplest types of
To start the simplest kind of session, all you need to do is to
enter a few basic parameters.
-In the \e{Host Name} box, enter the Internet host name of the server
+In the \q{Host Name} box, enter the Internet host name of the server
you want to connect to. You should have been told this by the
provider of your login account.
-Now select a login protocol to use, from the \e{Protocol} buttons.
+Now select a login protocol to use, from the \q{Protocol} buttons.
For a login session, you should select Telnet, Rlogin or SSH. See
\k{which-one} for a description of the differences between the three
protocols, and advice on which one to use. The fourth protocol,
\e{Raw}, is not used for interactive login sessions; you would
usually use this for debugging other Internet services.
-When you change the selected protocol, the number in the \e{Port}
+When you change the selected protocol, the number in the \q{Port}
box will change. This is normal: it happens because the various
login services are usually provided on different network ports by
the server machine. Most servers will use the standard port numbers,
administrator should have told you which one. (For example, many
MUDs run Telnet service on a port other than 23.)
-Once you have filled in the \e{Host Name}, \e{Protocol}, and
-possibly \e{Port} settings, you are ready to connect. Press the
-\e{Open} button at the bottom of the dialog box, and PuTTY will
+Once you have filled in the \q{Host Name}, \q{Protocol}, and
+possibly \q{Port} settings, you are ready to connect. Press the
+\q{Open} button at the bottom of the dialog box, and PuTTY will
begin trying to connect you to the server.
\H{gs-hostkey} Verifying the Host Key (SSHÂ only)
If you are using SSH to connect to a server for the first time, you
will probably see a message looking something like this:
-\# FIXME: copy the real message from the host key dialog
+\c The server's host key is not cached in the registry. You
+\c have no guarantee that the server is the computer you
+\c think it is.
+\c The server's key fingerprint is:
+\c ssh-rsa 1024 7b:e5:6f:a7:f4:f9:81:62:5c:e3:1f:bf:8b:57:6c:5a
+\c If you trust this host, hit Yes to add the key to
+\c PuTTY's cache and carry on connecting.
+\c If you want to carry on connecting just once, without
+\c adding the key to the cache, hit No.
+\c If you do not trust this host, hit Cancel to abandon the
+\c connection.
This is a feature of the SSH protocol. It is designed to protect you
against a network attack known as \e{spoofing}: secretly redirecting