NULL needs to be cast to void * when passed to a variadic function like
[sgt/putty] / doc / pscp.but
CommitLineData
39a938f7 1\define{versionidpscp} \versionid $Id$
768ada0c 2
ded53fce 3\#FIXME: Need examples
768ada0c 4
e5b0d077 5\C{pscp} Using PSCP to transfer files securely
6
ffd64114 7\i{PSCP}, the PuTTY Secure Copy client, is a tool for transferring files
768ada0c 8securely between computers using an SSH connection.
9
2e85c969 10If you have an SSH-2 server, you might prefer PSFTP (see \k{psftp})
11for interactive use. PSFTP does not in general work with SSH-1
9a313f60 12servers, however.
13
768ada0c 14\H{pscp-starting} Starting PSCP
15
16PSCP is a command line application. This means that you cannot just
17double-click on its icon to run it and instead you have to bring up a
ffd64114 18\i{console window}. With Windows 95, 98, and ME, this is called an
768ada0c 19\q{MS-DOS Prompt} and with Windows NT and 2000 it is called a
20\q{Command Prompt}. It should be available from the Programs section
21of your Start Menu.
22
ffd64114 23To start PSCP it will need either to be on your \i{\c{PATH}} or in your
768ada0c 24current directory. To add the directory containing PSCP to your
25\c{PATH} environment variable, type into the console window:
26
8452efbc 27\c set PATH=C:\path\to\putty\directory;%PATH%
768ada0c 28
e35b2951 29This will only work for the lifetime of that particular console
30window. To set your \c{PATH} more permanently on Windows NT, use the
31Environment tab of the System Control Panel. On Windows 95, 98, and
32ME, you will need to edit your \c{AUTOEXEC.BAT} to include a \c{set}
33command like the one above.
768ada0c 34
35\H{pscp-usage} PSCP Usage
36
37Once you've got a console window to type into, you can just type
38\c{pscp} on its own to bring up a usage message. This tells you the
39version of PSCP you're using, and gives you a brief summary of how to
40use PSCP:
41
42\c Z:\owendadmin>pscp
43\c PuTTY Secure Copy client
c9a13be6 44\c Release 0.XX
768ada0c 45\c Usage: pscp [options] [user@]host:source target
e2a197cf 46\c pscp [options] source [source...] [user@]host:target
db77dfb8 47\c pscp [options] -ls [user@]host:filespec
768ada0c 48\c Options:
2285d016 49\c -V print version information and exit
50\c -pgpfp print PGP key fingerprints and exit
768ada0c 51\c -p preserve file attributes
52\c -q quiet, don't show statistics
53\c -r copy directories recursively
54\c -v show verbose messages
e2a197cf 55\c -load sessname Load settings from saved session
768ada0c 56\c -P port connect to specified port
e2a197cf 57\c -l user connect with specified username
768ada0c 58\c -pw passw login with specified password
e2a197cf 59\c -1 -2 force use of particular SSH protocol version
05581745 60\c -4 -6 force use of IPv4 or IPv6
e2a197cf 61\c -C enable compression
62\c -i key private key file for authentication
63\c -batch disable all interactive prompts
64\c -unsafe allow server-side wildcards (DANGEROUS)
728f4f4c 65\c -sftp force use of SFTP protocol
6e310bc2 66\c -scp force use of SCP protocol
768ada0c 67
68(PSCP's interface is much like the Unix \c{scp} command, if you're
69familiar with that.)
70
71\S{pscp-usage-basics} The basics
72
73To receive (a) file(s) from a remote server:
74
ded53fce 75\c pscp [options] [user@]host:source target
76
0b06900c 77So to copy the file \c{/etc/hosts} from the server \c{example.com} as
78user \c{fred} to the file \c{c:\\temp\\example-hosts.txt}, you would type:
ded53fce 79
80\c pscp fred@example.com:/etc/hosts c:\temp\example-hosts.txt
768ada0c 81
82To send (a) file(s) to a remote server:
83
ded53fce 84\c pscp [options] source [source...] [user@]host:target
85
35cffede 86So to copy the local file \c{c:\\documents\\foo.txt} to the server
87\c{example.com} as user \c{fred} to the file \c{/tmp/foo} you would
88type:
ded53fce 89
35cffede 90\c pscp c:\documents\foo.txt fred@example.com:/tmp/foo
768ada0c 91
a4196579 92You can use wildcards to transfer multiple files in either
93direction, like this:
94
95\c pscp c:\documents\*.doc fred@example.com:docfiles
96\c pscp fred@example.com:source/*.c c:\source
97
98However, in the second case (using a wildcard for multiple remote
35cffede 99files) you may see a warning saying something like \q{warning:
9097913f 100remote host tried to write to a file called \cq{terminal.c} when we
101requested a file called \cq{*.c}. If this is a wildcard, consider
2e85c969 102upgrading to SSH-2 or using the \cq{-unsafe} option. Renaming of
9097913f 103this file has been disallowed}.
a4196579 104
105This is due to a fundamental insecurity in the old-style SCP
106protocol: the client sends the wildcard string (\c{*.c}) to the
107server, and the server sends back a sequence of file names that
108match the wildcard pattern. However, there is nothing to stop the
109server sending back a \e{different} pattern and writing over one of
110your other files: if you request \c{*.c}, the server might send back
111the file name \c{AUTOEXEC.BAT} and install a virus for you. Since
112the wildcard matching rules are decided by the server, the client
113cannot reliably verify that the filenames sent back match the
114pattern.
115
2e85c969 116PSCP will attempt to use the newer SFTP protocol (part of SSH-2)
a4196579 117where possible, which does not suffer from this security flaw. If
2e85c969 118you are talking to an SSH-2 server which supports SFTP, you will
728f4f4c 119never see this warning. (You can force use of the SFTP protocol,
120if available, with \c{-sftp} - see \k{pscp-usage-options-backend}.)
a4196579 121
2e85c969 122If you really need to use a server-side wildcard with an SSH-1
a4196579 123server, you can use the \c{-unsafe} command line option with PSCP:
124
125\c pscp -unsafe fred@example.com:source/*.c c:\source
126
127This will suppress the warning message and the file transfer will
128happen. However, you should be aware that by using this option you
129are giving the server the ability to write to \e{any} file in the
130target directory, so you should only use this option if you trust
131the server administrator not to be malicious (and not to let the
9097913f 132server machine be cracked by malicious people). Alternatively, do
133any such download in a newly created empty directory. (Even in
134\q{unsafe} mode, PSCP will still protect you against the server
135trying to get out of that directory using pathnames including
136\cq{..}.)
a4196579 137
ffd64114 138\S2{pscp-usage-basics-user} \c{user}
139
140The login name on the remote server. If this is omitted, and \c{host}
141is a PuTTY saved session, PSCP will use any username specified by that
142saved session. Otherwise, PSCP will attempt to use the local Windows
143username.
144
145\S2{pscp-usage-basics-host} \c{host}
146
147The name of the remote server, or the name of an existing PuTTY saved
148session. In the latter case, the session's settings for hostname, port
149number, cipher type and username will be used.
768ada0c 150
ffd64114 151\S2{pscp-usage-basics-source} \c{source}
768ada0c 152
ffd64114 153One or more source files. \i{Wildcards} are allowed. The syntax of
154wildcards depends on the system to which they apply, so if you are
155copying \e{from} a Windows system \e{to} a UNIX system, you should use
116934a6 156Windows wildcard syntax (e.g. \c{*.*}), but if you are copying \e{from}
ffd64114 157a UNIX system \e{to} a Windows system, you would use the wildcard
158syntax allowed by your UNIX shell (e.g. \c{*}).
768ada0c 159
ded53fce 160If the source is a remote server and you do not specify a full
161pathname (in UNIX, a pathname beginning with a \c{/} (slash)
162character), what you specify as a source will be interpreted relative
163to your home directory on the remote server.
164
ffd64114 165\S2{pscp-usage-basics-target} \c{target}
768ada0c 166
ded53fce 167The filename or directory to put the file(s). When copying from a
168remote server to a local host, you may wish simply to place the
169file(s) in the current directory. To do this, you should specify a
170target of \c{.}. For example:
171
172\c pscp fred@example.com:/home/tom/.emacs .
173
174...would copy \c{/home/tom/.emacs} on the remote server to the current
175directory.
176
177As with the \c{source} parameter, if the target is on a remote server
178and is not a full path name, it is interpreted relative to your home
179directory on the remote server.
768ada0c 180
181\S{pscp-usage-options} Options
182
e117a742 183PSCP accepts all the general command line options supported by the
184PuTTY tools, except the ones which make no sense in a file transfer
185utility. See \k{using-general-opts} for a description of these
186options. (The ones not supported by PSCP are clearly marked.)
187
188PSCP also supports some of its own options. The following sections
189describe PSCP's specific command-line options.
190
ffd64114 191These are the command line options that PSCP accepts.
768ada0c 192
193\S2{pscp-usage-options-p}\c{-p} preserve file attributes
194
ffd64114 195By default, files copied with PSCP are \i{timestamp}ed with the date and
768ada0c 196time they were copied. The \c{-p} option preserves the original
197timestamp on copied files.
198
ffd64114 199\S2{pscp-usage-options-q}\c{-q} quiet, don't show \i{statistics}
768ada0c 200
201By default, PSCP displays a meter displaying the progress of the
202current transfer:
203
35cffede 204\c mibs.tar | 168 kB | 84.0 kB/s | ETA: 00:00:13 | 13%
768ada0c 205
206The fields in this display are (from left to right), filename, size
207(in kilobytes) of file transferred so far, estimate of how fast the
208file is being transferred (in kilobytes per second), estimated time
209that the transfer will be complete, and percentage of the file so far
210transferred. The \c{-q} option to PSCP suppresses the printing of
211these statistics.
212
ffd64114 213\S2{pscp-usage-options-r}\c{-r} copies directories \i{recursive}ly
768ada0c 214
b3fa9b5e 215By default, PSCP will only copy files. Any directories you specify to
216copy will be skipped, as will their contents. The \c{-r} option tells
217PSCP to descend into any directories you specify, and to copy them and
218their contents. This allows you to use PSCP to transfer whole
219directory structures between machines.
220
ff2ae367 221\S2{pscp-usage-options-batch}\c{-batch} avoid interactive prompts
222
223If you use the \c{-batch} option, PSCP will never give an
224interactive prompt while establishing the connection. If the
225server's host key is invalid, for example (see \k{gs-hostkey}), then
226the connection will simply be abandoned instead of asking you what
227to do next.
228
229This may help PSCP's behaviour when it is used in automated
230scripts: using \c{-batch}, if something goes wrong at connection
231time, the batch job will fail rather than hang.
232
728f4f4c 233\S2{pscp-usage-options-backend}\c{-sftp}, \c{-scp} force use of
234particular protocol
235
236As mentioned in \k{pscp-usage-basics}, there are two different file
237transfer protocols in use with SSH. Despite its name, PSCP (like many
238other ostensible \cw{scp} clients) can use either of these protocols.
239
240The older SCP protocol does not have a written specification and
241leaves a lot of detail to the server platform. Wildcards are expanded
242on the server. The simple design means that any wildcard specification
243supported by the server platform (such as brace expansion) can be
244used, but also leads to interoperability issues such as with filename
245quoting (for instance, where filenames contain spaces), and also the
246security issue described in \k{pscp-usage-basics}.
247
2e85c969 248The newer SFTP protocol, which is usually associated with SSH-2
728f4f4c 249servers, is specified in a more platform independent way, and leaves
9d210cac 250issues such as wildcard syntax up to the client. (PuTTY's SFTP
251wildcard syntax is described in \k{psftp-wildcards}.) This makes it
252more consistent across platforms, more suitable for scripting and
253automation, and avoids security issues with wildcard matching.
728f4f4c 254
255Normally PSCP will attempt to use the SFTP protocol, and only fall
256back to the SCP protocol if SFTP is not available on the server.
257
258The \c{-scp} option forces PSCP to use the SCP protocol or quit.
259
260The \c{-sftp} option forces PSCP to use the SFTP protocol or quit.
261When this option is specified, PSCP looks harder for an SFTP server,
2e85c969 262which may allow use of SFTP with SSH-1 depending on server setup.
728f4f4c 263
4cbe74f4 264\S{pscp-retval} Return value
a4196579 265
266PSCP returns an \cw{ERRORLEVEL} of zero (success) only if the files
267were correctly transferred. You can test for this in a batch file,
268using code such as this:
269
270\c pscp file*.* user@hostname:
271\c if errorlevel 1 echo There was an error
272
6da38567 273\S{pscp-pubkey} Using public key authentication with PSCP
274
275Like PuTTY, PSCP can authenticate using a public key instead of a
e2a197cf 276password. There are three ways you can do this.
6da38567 277
278Firstly, PSCP can use PuTTY saved sessions in place of hostnames
279(see \k{pscp-usage-basics-host}). So you would do this:
280
281\b Run PuTTY, and create a PuTTY saved session (see
282\k{config-saving}) which specifies your private key file (see
add788fc 283\k{config-ssh-privkey}). You will probably also want to specify a
284username to log in as (see \k{config-username}).
6da38567 285
286\b In PSCP, you can now use the name of the session instead of a
edcbf00a 287hostname: type \c{pscp sessionname:file localfile}, where
288\c{sessionname} is replaced by the name of your saved session.
6da38567 289
e2a197cf 290Secondly, you can supply the name of a private key file on the command
291line, with the \c{-i} option. See \k{using-cmdline-identity} for more
292information.
293
294Thirdly, PSCP will attempt to authenticate using Pageant if Pageant
6da38567 295is running (see \k{pageant}). So you would do this:
296
297\b Ensure Pageant is running, and has your private key stored in it.
298
299\b Specify a user and host name to PSCP as normal. PSCP will
300automatically detect Pageant and try to use the keys within it.
301
302For more general information on public-key authentication, see
303\k{pubkey}.