Fix typo in -C
[sgt/putty] / doc / pscp.but
... / ...
CommitLineData
1\versionid $Id: pscp.but,v 1.24 2004/02/13 11:20:42 jacob Exp $
2
3\#FIXME: Need examples
4
5\C{pscp} Using PSCP to transfer files securely
6
7\i{PSCP}, the PuTTY Secure Copy client, is a tool for transferring files
8securely between computers using an SSH connection.
9
10If you have an SSH 2 server, you might prefer PSFTP (see \k{psftp})
11for interactive use. PSFTP does not in general work with SSH 1
12servers, however.
13
14\H{pscp-starting} Starting PSCP
15
16PSCP is a command line application. This means that you cannot just
17double-click on its icon to run it and instead you have to bring up a
18\i{console window}. With Windows 95, 98, and ME, this is called an
19\q{MS-DOS Prompt} and with Windows NT and 2000 it is called a
20\q{Command Prompt}. It should be available from the Programs section
21of your Start Menu.
22
23To start PSCP it will need either to be on your \i{\c{PATH}} or in your
24current directory. To add the directory containing PSCP to your
25\c{PATH} environment variable, type into the console window:
26
27\c set PATH=C:\path\to\putty\directory;%PATH%
28
29This will only work for the lifetime of that particular console
30window. To set your \c{PATH} more permanently on Windows NT, use the
31Environment tab of the System Control Panel. On Windows 95, 98, and
32ME, you will need to edit your \c{AUTOEXEC.BAT} to include a \c{set}
33command like the one above.
34
35\H{pscp-usage} PSCP Usage
36
37Once you've got a console window to type into, you can just type
38\c{pscp} on its own to bring up a usage message. This tells you the
39version of PSCP you're using, and gives you a brief summary of how to
40use PSCP:
41
42\c Z:\owendadmin>pscp
43\c PuTTY Secure Copy client
44\c Release 0.54
45\c Usage: pscp [options] [user@]host:source target
46\c pscp [options] source [source...] [user@]host:target
47\c pscp [options] -ls user@host:filespec
48\c Options:
49\c -p preserve file attributes
50\c -q quiet, don't show statistics
51\c -r copy directories recursively
52\c -v show verbose messages
53\c -load sessname Load settings from saved session
54\c -P port connect to specified port
55\c -l user connect with specified username
56\c -pw passw login with specified password
57\c -1 -2 force use of particular SSH protocol version
58\c -C enable compression
59\c -i key private key file for authentication
60\c -batch disable all interactive prompts
61\c -unsafe allow server-side wildcards (DANGEROUS)
62
63(PSCP's interface is much like the Unix \c{scp} command, if you're
64familiar with that.)
65
66\S{pscp-usage-basics} The basics
67
68To receive (a) file(s) from a remote server:
69
70\c pscp [options] [user@]host:source target
71
72So to copy the file \c{/etc/hosts} from the server \c{example.com} as
73user \c{fred} to the file \c{c:\\temp\\example-hosts.txt}, you would type:
74
75\c pscp fred@example.com:/etc/hosts c:\temp\example-hosts.txt
76
77To send (a) file(s) to a remote server:
78
79\c pscp [options] source [source...] [user@]host:target
80
81So to copy the local file \c{c:\\documents\\csh-whynot.txt} to the
82server \c{example.com} as user \c{fred} to the file
83\c{/tmp/csh-whynot} you would type:
84
85\c pscp c:\documents\csh-whynot.txt fred@example.com:/tmp/csh-whynot
86
87You can use wildcards to transfer multiple files in either
88direction, like this:
89
90\c pscp c:\documents\*.doc fred@example.com:docfiles
91\c pscp fred@example.com:source/*.c c:\source
92
93However, in the second case (using a wildcard for multiple remote
94files) you may see a warning like this:
95
96\c warning: remote host tried to write to a file called 'terminal.c'
97\c when we requested a file called '*.c'.
98\c If this is a wildcard, consider upgrading to SSH 2 or using
99\c the '-unsafe' option. Renaming of this file has been disallowed.
100
101This is due to a fundamental insecurity in the old-style SCP
102protocol: the client sends the wildcard string (\c{*.c}) to the
103server, and the server sends back a sequence of file names that
104match the wildcard pattern. However, there is nothing to stop the
105server sending back a \e{different} pattern and writing over one of
106your other files: if you request \c{*.c}, the server might send back
107the file name \c{AUTOEXEC.BAT} and install a virus for you. Since
108the wildcard matching rules are decided by the server, the client
109cannot reliably verify that the filenames sent back match the
110pattern.
111
112PSCP will attempt to use the newer SFTP protocol (part of SSH 2)
113where possible, which does not suffer from this security flaw. If
114you are talking to an SSH 2 server which supports SFTP, you will
115never see this warning.
116
117If you really need to use a server-side wildcard with an SSH 1
118server, you can use the \c{-unsafe} command line option with PSCP:
119
120\c pscp -unsafe fred@example.com:source/*.c c:\source
121
122This will suppress the warning message and the file transfer will
123happen. However, you should be aware that by using this option you
124are giving the server the ability to write to \e{any} file in the
125target directory, so you should only use this option if you trust
126the server administrator not to be malicious (and not to let the
127server machine be cracked by malicious people).
128
129\S2{pscp-usage-basics-user} \c{user}
130
131The login name on the remote server. If this is omitted, and \c{host}
132is a PuTTY saved session, PSCP will use any username specified by that
133saved session. Otherwise, PSCP will attempt to use the local Windows
134username.
135
136\S2{pscp-usage-basics-host} \c{host}
137
138The name of the remote server, or the name of an existing PuTTY saved
139session. In the latter case, the session's settings for hostname, port
140number, cipher type and username will be used.
141
142\S2{pscp-usage-basics-source} \c{source}
143
144One or more source files. \i{Wildcards} are allowed. The syntax of
145wildcards depends on the system to which they apply, so if you are
146copying \e{from} a Windows system \e{to} a UNIX system, you should use
147Windows wildcard syntax (e.g. \c{*.*}), but if you are copying \e{from}
148a UNIX system \e{to} a Windows system, you would use the wildcard
149syntax allowed by your UNIX shell (e.g. \c{*}).
150
151If the source is a remote server and you do not specify a full
152pathname (in UNIX, a pathname beginning with a \c{/} (slash)
153character), what you specify as a source will be interpreted relative
154to your home directory on the remote server.
155
156\S2{pscp-usage-basics-target} \c{target}
157
158The filename or directory to put the file(s). When copying from a
159remote server to a local host, you may wish simply to place the
160file(s) in the current directory. To do this, you should specify a
161target of \c{.}. For example:
162
163\c pscp fred@example.com:/home/tom/.emacs .
164
165...would copy \c{/home/tom/.emacs} on the remote server to the current
166directory.
167
168As with the \c{source} parameter, if the target is on a remote server
169and is not a full path name, it is interpreted relative to your home
170directory on the remote server.
171
172\S{pscp-usage-options} Options
173
174PSCP accepts all the general command line options supported by the
175PuTTY tools, except the ones which make no sense in a file transfer
176utility. See \k{using-general-opts} for a description of these
177options. (The ones not supported by PSCP are clearly marked.)
178
179PSCP also supports some of its own options. The following sections
180describe PSCP's specific command-line options.
181
182These are the command line options that PSCP accepts.
183
184\S2{pscp-usage-options-p}\c{-p} preserve file attributes
185
186By default, files copied with PSCP are \i{timestamp}ed with the date and
187time they were copied. The \c{-p} option preserves the original
188timestamp on copied files.
189
190\S2{pscp-usage-options-q}\c{-q} quiet, don't show \i{statistics}
191
192By default, PSCP displays a meter displaying the progress of the
193current transfer:
194
195\c mibs.tar | 168 kB | 84.0 kB/s | ETA: 00:00:13 | 13%
196
197The fields in this display are (from left to right), filename, size
198(in kilobytes) of file transferred so far, estimate of how fast the
199file is being transferred (in kilobytes per second), estimated time
200that the transfer will be complete, and percentage of the file so far
201transferred. The \c{-q} option to PSCP suppresses the printing of
202these statistics.
203
204\S2{pscp-usage-options-r}\c{-r} copies directories \i{recursive}ly
205
206By default, PSCP will only copy files. Any directories you specify to
207copy will be skipped, as will their contents. The \c{-r} option tells
208PSCP to descend into any directories you specify, and to copy them and
209their contents. This allows you to use PSCP to transfer whole
210directory structures between machines.
211
212\S2{pscp-usage-options-batch}\c{-batch} avoid interactive prompts
213
214If you use the \c{-batch} option, PSCP will never give an
215interactive prompt while establishing the connection. If the
216server's host key is invalid, for example (see \k{gs-hostkey}), then
217the connection will simply be abandoned instead of asking you what
218to do next.
219
220This may help PSCP's behaviour when it is used in automated
221scripts: using \c{-batch}, if something goes wrong at connection
222time, the batch job will fail rather than hang.
223
224\S{pscp-retval} Return value
225
226PSCP returns an \cw{ERRORLEVEL} of zero (success) only if the files
227were correctly transferred. You can test for this in a batch file,
228using code such as this:
229
230\c pscp file*.* user@hostname:
231\c if errorlevel 1 echo There was an error
232
233\S{pscp-pubkey} Using public key authentication with PSCP
234
235Like PuTTY, PSCP can authenticate using a public key instead of a
236password. There are three ways you can do this.
237
238Firstly, PSCP can use PuTTY saved sessions in place of hostnames
239(see \k{pscp-usage-basics-host}). So you would do this:
240
241\b Run PuTTY, and create a PuTTY saved session (see
242\k{config-saving}) which specifies your private key file (see
243\k{config-ssh-privkey}). You will probably also want to specify a
244username to log in as (see \k{config-username}).
245
246\b In PSCP, you can now use the name of the session instead of a
247hostname: type \c{pscp sessionname:file localfile}, where
248\c{sessionname} is replaced by the name of your saved session.
249
250Secondly, you can supply the name of a private key file on the command
251line, with the \c{-i} option. See \k{using-cmdline-identity} for more
252information.
253
254Thirdly, PSCP will attempt to authenticate using Pageant if Pageant
255is running (see \k{pageant}). So you would do this:
256
257\b Ensure Pageant is running, and has your private key stored in it.
258
259\b Specify a user and host name to PSCP as normal. PSCP will
260automatically detect Pageant and try to use the keys within it.
261
262For more general information on public-key authentication, see
263\k{pubkey}.