In the special case that handles selecting a session and hitting Enter,
[sgt/putty] / doc / pscp.but
CommitLineData
c9a13be6 1\versionid $Id: pscp.but,v 1.26 2004/04/24 12:25:08 jacob Exp $
768ada0c 2
ded53fce 3\#FIXME: Need examples
768ada0c 4
e5b0d077 5\C{pscp} Using PSCP to transfer files securely
6
ffd64114 7\i{PSCP}, the PuTTY Secure Copy client, is a tool for transferring files
768ada0c 8securely between computers using an SSH connection.
9
9a313f60 10If you have an SSH 2 server, you might prefer PSFTP (see \k{psftp})
11for interactive use. PSFTP does not in general work with SSH 1
12servers, however.
13
768ada0c 14\H{pscp-starting} Starting PSCP
15
16PSCP is a command line application. This means that you cannot just
17double-click on its icon to run it and instead you have to bring up a
ffd64114 18\i{console window}. With Windows 95, 98, and ME, this is called an
768ada0c 19\q{MS-DOS Prompt} and with Windows NT and 2000 it is called a
20\q{Command Prompt}. It should be available from the Programs section
21of your Start Menu.
22
ffd64114 23To start PSCP it will need either to be on your \i{\c{PATH}} or in your
768ada0c 24current directory. To add the directory containing PSCP to your
25\c{PATH} environment variable, type into the console window:
26
8452efbc 27\c set PATH=C:\path\to\putty\directory;%PATH%
768ada0c 28
e35b2951 29This will only work for the lifetime of that particular console
30window. To set your \c{PATH} more permanently on Windows NT, use the
31Environment tab of the System Control Panel. On Windows 95, 98, and
32ME, you will need to edit your \c{AUTOEXEC.BAT} to include a \c{set}
33command like the one above.
768ada0c 34
35\H{pscp-usage} PSCP Usage
36
37Once you've got a console window to type into, you can just type
38\c{pscp} on its own to bring up a usage message. This tells you the
39version of PSCP you're using, and gives you a brief summary of how to
40use PSCP:
41
42\c Z:\owendadmin>pscp
43\c PuTTY Secure Copy client
c9a13be6 44\c Release 0.XX
768ada0c 45\c Usage: pscp [options] [user@]host:source target
e2a197cf 46\c pscp [options] source [source...] [user@]host:target
db77dfb8 47\c pscp [options] -ls [user@]host:filespec
768ada0c 48\c Options:
49\c -p preserve file attributes
50\c -q quiet, don't show statistics
51\c -r copy directories recursively
52\c -v show verbose messages
e2a197cf 53\c -load sessname Load settings from saved session
768ada0c 54\c -P port connect to specified port
e2a197cf 55\c -l user connect with specified username
768ada0c 56\c -pw passw login with specified password
e2a197cf 57\c -1 -2 force use of particular SSH protocol version
58\c -C enable compression
59\c -i key private key file for authentication
60\c -batch disable all interactive prompts
61\c -unsafe allow server-side wildcards (DANGEROUS)
c9a13be6 62\c -V print version information
768ada0c 63
64(PSCP's interface is much like the Unix \c{scp} command, if you're
65familiar with that.)
66
67\S{pscp-usage-basics} The basics
68
69To receive (a) file(s) from a remote server:
70
ded53fce 71\c pscp [options] [user@]host:source target
72
0b06900c 73So to copy the file \c{/etc/hosts} from the server \c{example.com} as
74user \c{fred} to the file \c{c:\\temp\\example-hosts.txt}, you would type:
ded53fce 75
76\c pscp fred@example.com:/etc/hosts c:\temp\example-hosts.txt
768ada0c 77
78To send (a) file(s) to a remote server:
79
ded53fce 80\c pscp [options] source [source...] [user@]host:target
81
0b06900c 82So to copy the local file \c{c:\\documents\\csh-whynot.txt} to the
83server \c{example.com} as user \c{fred} to the file
ded53fce 84\c{/tmp/csh-whynot} you would type:
85
86\c pscp c:\documents\csh-whynot.txt fred@example.com:/tmp/csh-whynot
768ada0c 87
a4196579 88You can use wildcards to transfer multiple files in either
89direction, like this:
90
91\c pscp c:\documents\*.doc fred@example.com:docfiles
92\c pscp fred@example.com:source/*.c c:\source
93
94However, in the second case (using a wildcard for multiple remote
95files) you may see a warning like this:
96
97\c warning: remote host tried to write to a file called 'terminal.c'
98\c when we requested a file called '*.c'.
99\c If this is a wildcard, consider upgrading to SSH 2 or using
100\c the '-unsafe' option. Renaming of this file has been disallowed.
101
102This is due to a fundamental insecurity in the old-style SCP
103protocol: the client sends the wildcard string (\c{*.c}) to the
104server, and the server sends back a sequence of file names that
105match the wildcard pattern. However, there is nothing to stop the
106server sending back a \e{different} pattern and writing over one of
107your other files: if you request \c{*.c}, the server might send back
108the file name \c{AUTOEXEC.BAT} and install a virus for you. Since
109the wildcard matching rules are decided by the server, the client
110cannot reliably verify that the filenames sent back match the
111pattern.
112
113PSCP will attempt to use the newer SFTP protocol (part of SSH 2)
114where possible, which does not suffer from this security flaw. If
115you are talking to an SSH 2 server which supports SFTP, you will
116never see this warning.
117
118If you really need to use a server-side wildcard with an SSH 1
119server, you can use the \c{-unsafe} command line option with PSCP:
120
121\c pscp -unsafe fred@example.com:source/*.c c:\source
122
123This will suppress the warning message and the file transfer will
124happen. However, you should be aware that by using this option you
125are giving the server the ability to write to \e{any} file in the
126target directory, so you should only use this option if you trust
127the server administrator not to be malicious (and not to let the
128server machine be cracked by malicious people).
129
ffd64114 130\S2{pscp-usage-basics-user} \c{user}
131
132The login name on the remote server. If this is omitted, and \c{host}
133is a PuTTY saved session, PSCP will use any username specified by that
134saved session. Otherwise, PSCP will attempt to use the local Windows
135username.
136
137\S2{pscp-usage-basics-host} \c{host}
138
139The name of the remote server, or the name of an existing PuTTY saved
140session. In the latter case, the session's settings for hostname, port
141number, cipher type and username will be used.
768ada0c 142
ffd64114 143\S2{pscp-usage-basics-source} \c{source}
768ada0c 144
ffd64114 145One or more source files. \i{Wildcards} are allowed. The syntax of
146wildcards depends on the system to which they apply, so if you are
147copying \e{from} a Windows system \e{to} a UNIX system, you should use
116934a6 148Windows wildcard syntax (e.g. \c{*.*}), but if you are copying \e{from}
ffd64114 149a UNIX system \e{to} a Windows system, you would use the wildcard
150syntax allowed by your UNIX shell (e.g. \c{*}).
768ada0c 151
ded53fce 152If the source is a remote server and you do not specify a full
153pathname (in UNIX, a pathname beginning with a \c{/} (slash)
154character), what you specify as a source will be interpreted relative
155to your home directory on the remote server.
156
ffd64114 157\S2{pscp-usage-basics-target} \c{target}
768ada0c 158
ded53fce 159The filename or directory to put the file(s). When copying from a
160remote server to a local host, you may wish simply to place the
161file(s) in the current directory. To do this, you should specify a
162target of \c{.}. For example:
163
164\c pscp fred@example.com:/home/tom/.emacs .
165
166...would copy \c{/home/tom/.emacs} on the remote server to the current
167directory.
168
169As with the \c{source} parameter, if the target is on a remote server
170and is not a full path name, it is interpreted relative to your home
171directory on the remote server.
768ada0c 172
173\S{pscp-usage-options} Options
174
e117a742 175PSCP accepts all the general command line options supported by the
176PuTTY tools, except the ones which make no sense in a file transfer
177utility. See \k{using-general-opts} for a description of these
178options. (The ones not supported by PSCP are clearly marked.)
179
180PSCP also supports some of its own options. The following sections
181describe PSCP's specific command-line options.
182
ffd64114 183These are the command line options that PSCP accepts.
768ada0c 184
185\S2{pscp-usage-options-p}\c{-p} preserve file attributes
186
ffd64114 187By default, files copied with PSCP are \i{timestamp}ed with the date and
768ada0c 188time they were copied. The \c{-p} option preserves the original
189timestamp on copied files.
190
ffd64114 191\S2{pscp-usage-options-q}\c{-q} quiet, don't show \i{statistics}
768ada0c 192
193By default, PSCP displays a meter displaying the progress of the
194current transfer:
195
196\c mibs.tar | 168 kB | 84.0 kB/s | ETA: 00:00:13 | 13%
197
198The fields in this display are (from left to right), filename, size
199(in kilobytes) of file transferred so far, estimate of how fast the
200file is being transferred (in kilobytes per second), estimated time
201that the transfer will be complete, and percentage of the file so far
202transferred. The \c{-q} option to PSCP suppresses the printing of
203these statistics.
204
ffd64114 205\S2{pscp-usage-options-r}\c{-r} copies directories \i{recursive}ly
768ada0c 206
b3fa9b5e 207By default, PSCP will only copy files. Any directories you specify to
208copy will be skipped, as will their contents. The \c{-r} option tells
209PSCP to descend into any directories you specify, and to copy them and
210their contents. This allows you to use PSCP to transfer whole
211directory structures between machines.
212
ff2ae367 213\S2{pscp-usage-options-batch}\c{-batch} avoid interactive prompts
214
215If you use the \c{-batch} option, PSCP will never give an
216interactive prompt while establishing the connection. If the
217server's host key is invalid, for example (see \k{gs-hostkey}), then
218the connection will simply be abandoned instead of asking you what
219to do next.
220
221This may help PSCP's behaviour when it is used in automated
222scripts: using \c{-batch}, if something goes wrong at connection
223time, the batch job will fail rather than hang.
224
4cbe74f4 225\S{pscp-retval} Return value
a4196579 226
227PSCP returns an \cw{ERRORLEVEL} of zero (success) only if the files
228were correctly transferred. You can test for this in a batch file,
229using code such as this:
230
231\c pscp file*.* user@hostname:
232\c if errorlevel 1 echo There was an error
233
6da38567 234\S{pscp-pubkey} Using public key authentication with PSCP
235
236Like PuTTY, PSCP can authenticate using a public key instead of a
e2a197cf 237password. There are three ways you can do this.
6da38567 238
239Firstly, PSCP can use PuTTY saved sessions in place of hostnames
240(see \k{pscp-usage-basics-host}). So you would do this:
241
242\b Run PuTTY, and create a PuTTY saved session (see
243\k{config-saving}) which specifies your private key file (see
add788fc 244\k{config-ssh-privkey}). You will probably also want to specify a
245username to log in as (see \k{config-username}).
6da38567 246
247\b In PSCP, you can now use the name of the session instead of a
edcbf00a 248hostname: type \c{pscp sessionname:file localfile}, where
249\c{sessionname} is replaced by the name of your saved session.
6da38567 250
e2a197cf 251Secondly, you can supply the name of a private key file on the command
252line, with the \c{-i} option. See \k{using-cmdline-identity} for more
253information.
254
255Thirdly, PSCP will attempt to authenticate using Pageant if Pageant
6da38567 256is running (see \k{pageant}). So you would do this:
257
258\b Ensure Pageant is running, and has your private key stored in it.
259
260\b Specify a user and host name to PSCP as normal. PSCP will
261automatically detect Pageant and try to use the keys within it.
262
263For more general information on public-key authentication, see
264\k{pubkey}.