39a938f7 |
1 | \define{versionidpscp} \versionid $Id$ |
768ada0c |
2 | |
ded53fce |
3 | \#FIXME: Need examples |
768ada0c |
4 | |
421406a4 |
5 | \C{pscp} Using \i{PSCP} to transfer files securely |
e5b0d077 |
6 | |
421406a4 |
7 | \i{PSCP}, the PuTTY Secure Copy client, is a tool for \i{transferring files} |
768ada0c |
8 | securely between computers using an SSH connection. |
9 | |
2e85c969 |
10 | If you have an SSH-2 server, you might prefer PSFTP (see \k{psftp}) |
11 | for interactive use. PSFTP does not in general work with SSH-1 |
9a313f60 |
12 | servers, however. |
13 | |
768ada0c |
14 | \H{pscp-starting} Starting PSCP |
15 | |
16 | PSCP is a command line application. This means that you cannot just |
17 | double-click on its icon to run it and instead you have to bring up a |
ffd64114 |
18 | \i{console window}. With Windows 95, 98, and ME, this is called an |
421406a4 |
19 | \q{MS-DOS Prompt} and with Windows NT, 2000, and XP, it is called a |
768ada0c |
20 | \q{Command Prompt}. It should be available from the Programs section |
421406a4 |
21 | of your \i{Start Menu}. |
768ada0c |
22 | |
ffd64114 |
23 | To start PSCP it will need either to be on your \i{\c{PATH}} or in your |
768ada0c |
24 | current directory. To add the directory containing PSCP to your |
25 | \c{PATH} environment variable, type into the console window: |
26 | |
8452efbc |
27 | \c set PATH=C:\path\to\putty\directory;%PATH% |
768ada0c |
28 | |
e35b2951 |
29 | This will only work for the lifetime of that particular console |
421406a4 |
30 | window. To set your \c{PATH} more permanently on Windows NT, 2000, |
31 | and XP, use the Environment tab of the System Control Panel. On |
32 | Windows 95, 98, and ME, you will need to edit your \i\c{AUTOEXEC.BAT} |
33 | to include a \c{set} command like the one above. |
768ada0c |
34 | |
35 | \H{pscp-usage} PSCP Usage |
36 | |
37 | Once you've got a console window to type into, you can just type |
38 | \c{pscp} on its own to bring up a usage message. This tells you the |
39 | version of PSCP you're using, and gives you a brief summary of how to |
40 | use PSCP: |
41 | |
42 | \c Z:\owendadmin>pscp |
43 | \c PuTTY Secure Copy client |
c35ff6c8 |
44 | \c Release 0.58 |
768ada0c |
45 | \c Usage: pscp [options] [user@]host:source target |
e2a197cf |
46 | \c pscp [options] source [source...] [user@]host:target |
db77dfb8 |
47 | \c pscp [options] -ls [user@]host:filespec |
768ada0c |
48 | \c Options: |
2285d016 |
49 | \c -V print version information and exit |
50 | \c -pgpfp print PGP key fingerprints and exit |
768ada0c |
51 | \c -p preserve file attributes |
52 | \c -q quiet, don't show statistics |
53 | \c -r copy directories recursively |
54 | \c -v show verbose messages |
e2a197cf |
55 | \c -load sessname Load settings from saved session |
768ada0c |
56 | \c -P port connect to specified port |
e2a197cf |
57 | \c -l user connect with specified username |
768ada0c |
58 | \c -pw passw login with specified password |
e2a197cf |
59 | \c -1 -2 force use of particular SSH protocol version |
05581745 |
60 | \c -4 -6 force use of IPv4 or IPv6 |
e2a197cf |
61 | \c -C enable compression |
62 | \c -i key private key file for authentication |
63 | \c -batch disable all interactive prompts |
64 | \c -unsafe allow server-side wildcards (DANGEROUS) |
728f4f4c |
65 | \c -sftp force use of SFTP protocol |
6e310bc2 |
66 | \c -scp force use of SCP protocol |
768ada0c |
67 | |
68 | (PSCP's interface is much like the Unix \c{scp} command, if you're |
69 | familiar with that.) |
70 | |
71 | \S{pscp-usage-basics} The basics |
72 | |
421406a4 |
73 | To \I{receiving files}receive (a) file(s) from a remote server: |
768ada0c |
74 | |
ded53fce |
75 | \c pscp [options] [user@]host:source target |
76 | |
0b06900c |
77 | So to copy the file \c{/etc/hosts} from the server \c{example.com} as |
78 | user \c{fred} to the file \c{c:\\temp\\example-hosts.txt}, you would type: |
ded53fce |
79 | |
80 | \c pscp fred@example.com:/etc/hosts c:\temp\example-hosts.txt |
768ada0c |
81 | |
421406a4 |
82 | To \I{sending files}send (a) file(s) to a remote server: |
768ada0c |
83 | |
ded53fce |
84 | \c pscp [options] source [source...] [user@]host:target |
85 | |
35cffede |
86 | So to copy the local file \c{c:\\documents\\foo.txt} to the server |
87 | \c{example.com} as user \c{fred} to the file \c{/tmp/foo} you would |
88 | type: |
ded53fce |
89 | |
35cffede |
90 | \c pscp c:\documents\foo.txt fred@example.com:/tmp/foo |
768ada0c |
91 | |
421406a4 |
92 | You can use \i{wildcards} to transfer multiple files in either |
a4196579 |
93 | direction, like this: |
94 | |
95 | \c pscp c:\documents\*.doc fred@example.com:docfiles |
96 | \c pscp fred@example.com:source/*.c c:\source |
97 | |
98 | However, in the second case (using a wildcard for multiple remote |
35cffede |
99 | files) you may see a warning saying something like \q{warning: |
9097913f |
100 | remote host tried to write to a file called \cq{terminal.c} when we |
101 | requested a file called \cq{*.c}. If this is a wildcard, consider |
2e85c969 |
102 | upgrading to SSH-2 or using the \cq{-unsafe} option. Renaming of |
9097913f |
103 | this file has been disallowed}. |
a4196579 |
104 | |
421406a4 |
105 | This is due to a \I{security risk}fundamental insecurity in the old-style |
106 | \i{SCP protocol}: the client sends the wildcard string (\c{*.c}) to the |
a4196579 |
107 | server, and the server sends back a sequence of file names that |
108 | match the wildcard pattern. However, there is nothing to stop the |
109 | server sending back a \e{different} pattern and writing over one of |
110 | your other files: if you request \c{*.c}, the server might send back |
111 | the file name \c{AUTOEXEC.BAT} and install a virus for you. Since |
112 | the wildcard matching rules are decided by the server, the client |
113 | cannot reliably verify that the filenames sent back match the |
114 | pattern. |
115 | |
421406a4 |
116 | PSCP will attempt to use the newer \i{SFTP} protocol (part of SSH-2) |
a4196579 |
117 | where possible, which does not suffer from this security flaw. If |
2e85c969 |
118 | you are talking to an SSH-2 server which supports SFTP, you will |
728f4f4c |
119 | never see this warning. (You can force use of the SFTP protocol, |
120 | if available, with \c{-sftp} - see \k{pscp-usage-options-backend}.) |
a4196579 |
121 | |
2e85c969 |
122 | If you really need to use a server-side wildcard with an SSH-1 |
421406a4 |
123 | server, you can use the \i\c{-unsafe} command line option with PSCP: |
a4196579 |
124 | |
125 | \c pscp -unsafe fred@example.com:source/*.c c:\source |
126 | |
127 | This will suppress the warning message and the file transfer will |
128 | happen. However, you should be aware that by using this option you |
129 | are giving the server the ability to write to \e{any} file in the |
130 | target directory, so you should only use this option if you trust |
131 | the server administrator not to be malicious (and not to let the |
9097913f |
132 | server machine be cracked by malicious people). Alternatively, do |
133 | any such download in a newly created empty directory. (Even in |
134 | \q{unsafe} mode, PSCP will still protect you against the server |
135 | trying to get out of that directory using pathnames including |
136 | \cq{..}.) |
a4196579 |
137 | |
ffd64114 |
138 | \S2{pscp-usage-basics-user} \c{user} |
139 | |
421406a4 |
140 | The \i{login name} on the remote server. If this is omitted, and \c{host} |
ffd64114 |
141 | is a PuTTY saved session, PSCP will use any username specified by that |
142 | saved session. Otherwise, PSCP will attempt to use the local Windows |
143 | username. |
144 | |
421406a4 |
145 | \S2{pscp-usage-basics-host} \I{hostname}\c{host} |
ffd64114 |
146 | |
147 | The name of the remote server, or the name of an existing PuTTY saved |
148 | session. In the latter case, the session's settings for hostname, port |
149 | number, cipher type and username will be used. |
768ada0c |
150 | |
ffd64114 |
151 | \S2{pscp-usage-basics-source} \c{source} |
768ada0c |
152 | |
421406a4 |
153 | One or more source files. \ii{Wildcards} are allowed. The syntax of |
ffd64114 |
154 | wildcards depends on the system to which they apply, so if you are |
155 | copying \e{from} a Windows system \e{to} a UNIX system, you should use |
116934a6 |
156 | Windows wildcard syntax (e.g. \c{*.*}), but if you are copying \e{from} |
ffd64114 |
157 | a UNIX system \e{to} a Windows system, you would use the wildcard |
158 | syntax allowed by your UNIX shell (e.g. \c{*}). |
768ada0c |
159 | |
ded53fce |
160 | If the source is a remote server and you do not specify a full |
161 | pathname (in UNIX, a pathname beginning with a \c{/} (slash) |
162 | character), what you specify as a source will be interpreted relative |
421406a4 |
163 | to your \i{home directory} on the remote server. |
ded53fce |
164 | |
ffd64114 |
165 | \S2{pscp-usage-basics-target} \c{target} |
768ada0c |
166 | |
ded53fce |
167 | The filename or directory to put the file(s). When copying from a |
168 | remote server to a local host, you may wish simply to place the |
169 | file(s) in the current directory. To do this, you should specify a |
170 | target of \c{.}. For example: |
171 | |
172 | \c pscp fred@example.com:/home/tom/.emacs . |
173 | |
174 | ...would copy \c{/home/tom/.emacs} on the remote server to the current |
175 | directory. |
176 | |
177 | As with the \c{source} parameter, if the target is on a remote server |
178 | and is not a full path name, it is interpreted relative to your home |
179 | directory on the remote server. |
768ada0c |
180 | |
181 | \S{pscp-usage-options} Options |
182 | |
e117a742 |
183 | PSCP accepts all the general command line options supported by the |
184 | PuTTY tools, except the ones which make no sense in a file transfer |
185 | utility. See \k{using-general-opts} for a description of these |
186 | options. (The ones not supported by PSCP are clearly marked.) |
187 | |
188 | PSCP also supports some of its own options. The following sections |
189 | describe PSCP's specific command-line options. |
190 | |
ffd64114 |
191 | These are the command line options that PSCP accepts. |
768ada0c |
192 | |
421406a4 |
193 | \S2{pscp-usage-options-ls}\I{-ls-PSCP}\c{-ls} \I{listing files}list remote files |
194 | |
195 | If the \c{-ls} option is given, no files are transferred; instead, |
196 | remote files are listed. Only a hostname specification and |
197 | optional remote file specification need be given. For example: |
198 | |
199 | \c pscp -ls fred@example.com:dir1 |
200 | |
201 | The SCP protocol does not contain within itself a means of listing |
202 | files. If SCP is in use, this option therefore assumes that the |
f50fa177 |
203 | server responds appropriately to the command \c{ls\_-la}; |
204 | this may not work with all servers. |
421406a4 |
205 | |
206 | If SFTP is in use, this option should work with all servers. |
207 | |
208 | \S2{pscp-usage-options-p}\I{-p-PSCP}\c{-p} \i{preserve file attributes} |
768ada0c |
209 | |
ffd64114 |
210 | By default, files copied with PSCP are \i{timestamp}ed with the date and |
768ada0c |
211 | time they were copied. The \c{-p} option preserves the original |
212 | timestamp on copied files. |
213 | |
421406a4 |
214 | \S2{pscp-usage-options-q}\I{-q-PSCP}\c{-q} quiet, don't show \i{statistics} |
768ada0c |
215 | |
216 | By default, PSCP displays a meter displaying the progress of the |
217 | current transfer: |
218 | |
35cffede |
219 | \c mibs.tar | 168 kB | 84.0 kB/s | ETA: 00:00:13 | 13% |
768ada0c |
220 | |
221 | The fields in this display are (from left to right), filename, size |
222 | (in kilobytes) of file transferred so far, estimate of how fast the |
223 | file is being transferred (in kilobytes per second), estimated time |
224 | that the transfer will be complete, and percentage of the file so far |
225 | transferred. The \c{-q} option to PSCP suppresses the printing of |
226 | these statistics. |
227 | |
421406a4 |
228 | \S2{pscp-usage-options-r}\I{-r-PSCP}\c{-r} copies directories \i{recursive}ly |
768ada0c |
229 | |
b3fa9b5e |
230 | By default, PSCP will only copy files. Any directories you specify to |
231 | copy will be skipped, as will their contents. The \c{-r} option tells |
232 | PSCP to descend into any directories you specify, and to copy them and |
233 | their contents. This allows you to use PSCP to transfer whole |
234 | directory structures between machines. |
235 | |
421406a4 |
236 | \S2{pscp-usage-options-batch}\I{-batch-PSCP}\c{-batch} avoid interactive prompts |
ff2ae367 |
237 | |
238 | If you use the \c{-batch} option, PSCP will never give an |
239 | interactive prompt while establishing the connection. If the |
240 | server's host key is invalid, for example (see \k{gs-hostkey}), then |
241 | the connection will simply be abandoned instead of asking you what |
242 | to do next. |
243 | |
244 | This may help PSCP's behaviour when it is used in automated |
245 | scripts: using \c{-batch}, if something goes wrong at connection |
246 | time, the batch job will fail rather than hang. |
247 | |
421406a4 |
248 | \S2{pscp-usage-options-backend}\i\c{-sftp}, \i\c{-scp} force use of |
728f4f4c |
249 | particular protocol |
250 | |
251 | As mentioned in \k{pscp-usage-basics}, there are two different file |
252 | transfer protocols in use with SSH. Despite its name, PSCP (like many |
253 | other ostensible \cw{scp} clients) can use either of these protocols. |
254 | |
421406a4 |
255 | The older \i{SCP protocol} does not have a written specification and |
256 | leaves a lot of detail to the server platform. \ii{Wildcards} are expanded |
728f4f4c |
257 | on the server. The simple design means that any wildcard specification |
258 | supported by the server platform (such as brace expansion) can be |
259 | used, but also leads to interoperability issues such as with filename |
260 | quoting (for instance, where filenames contain spaces), and also the |
261 | security issue described in \k{pscp-usage-basics}. |
262 | |
421406a4 |
263 | The newer \i{SFTP} protocol, which is usually associated with SSH-2 |
728f4f4c |
264 | servers, is specified in a more platform independent way, and leaves |
9d210cac |
265 | issues such as wildcard syntax up to the client. (PuTTY's SFTP |
266 | wildcard syntax is described in \k{psftp-wildcards}.) This makes it |
267 | more consistent across platforms, more suitable for scripting and |
268 | automation, and avoids security issues with wildcard matching. |
728f4f4c |
269 | |
270 | Normally PSCP will attempt to use the SFTP protocol, and only fall |
271 | back to the SCP protocol if SFTP is not available on the server. |
272 | |
273 | The \c{-scp} option forces PSCP to use the SCP protocol or quit. |
274 | |
275 | The \c{-sftp} option forces PSCP to use the SFTP protocol or quit. |
276 | When this option is specified, PSCP looks harder for an SFTP server, |
2e85c969 |
277 | which may allow use of SFTP with SSH-1 depending on server setup. |
728f4f4c |
278 | |
421406a4 |
279 | \S{pscp-retval} \ii{Return value} |
a4196579 |
280 | |
421406a4 |
281 | PSCP returns an \i\cw{ERRORLEVEL} of zero (success) only if the files |
282 | were correctly transferred. You can test for this in a \i{batch file}, |
a4196579 |
283 | using code such as this: |
284 | |
285 | \c pscp file*.* user@hostname: |
286 | \c if errorlevel 1 echo There was an error |
287 | |
421406a4 |
288 | \S{pscp-pubkey} Using \i{public key authentication} with PSCP |
6da38567 |
289 | |
290 | Like PuTTY, PSCP can authenticate using a public key instead of a |
e2a197cf |
291 | password. There are three ways you can do this. |
6da38567 |
292 | |
293 | Firstly, PSCP can use PuTTY saved sessions in place of hostnames |
294 | (see \k{pscp-usage-basics-host}). So you would do this: |
295 | |
296 | \b Run PuTTY, and create a PuTTY saved session (see |
297 | \k{config-saving}) which specifies your private key file (see |
add788fc |
298 | \k{config-ssh-privkey}). You will probably also want to specify a |
299 | username to log in as (see \k{config-username}). |
6da38567 |
300 | |
301 | \b In PSCP, you can now use the name of the session instead of a |
edcbf00a |
302 | hostname: type \c{pscp sessionname:file localfile}, where |
303 | \c{sessionname} is replaced by the name of your saved session. |
6da38567 |
304 | |
e2a197cf |
305 | Secondly, you can supply the name of a private key file on the command |
306 | line, with the \c{-i} option. See \k{using-cmdline-identity} for more |
307 | information. |
308 | |
309 | Thirdly, PSCP will attempt to authenticate using Pageant if Pageant |
6da38567 |
310 | is running (see \k{pageant}). So you would do this: |
311 | |
312 | \b Ensure Pageant is running, and has your private key stored in it. |
313 | |
314 | \b Specify a user and host name to PSCP as normal. PSCP will |
315 | automatically detect Pageant and try to use the keys within it. |
316 | |
317 | For more general information on public-key authentication, see |
318 | \k{pubkey}. |