man-psft.but 4.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167
  1. \cfg{man-identity}{psftp}{1}{2004-03-24}{PuTTY tool suite}{PuTTY tool suite}
  2. \H{psftp-manpage} Man page for PSFTP
  3. \S{psftp-manpage-name} NAME
  4. \cw{psftp} \- interactive SFTP (secure file transfer protocol) client
  5. \S{psftp-manpage-synopsis} SYNOPSIS
  6. \c psftp [options] [user@]host
  7. \e bbbbb iiiiiii iiiib iiii
  8. \S{psftp-manpage-description} DESCRIPTION
  9. \cw{psftp} is an interactive text-based client for the SSH-based SFTP
  10. (secure file transfer) protocol.
  11. \S{psftp-manpage-options} OPTIONS
  12. The command-line options supported by \cw{psftp} are:
  13. \dt \cw{-V}
  14. \dd Show version information and exit.
  15. \dt \cw{-pgpfp}
  16. \dd Display the fingerprints of the PuTTY PGP Master Keys and exit,
  17. to aid in verifying new files released by the PuTTY team.
  18. \dt \cw{-b} \e{batchfile}
  19. \dd Use specified batchfile.
  20. \dt \cw{-bc}
  21. \dd Output batchfile commands.
  22. \dt \cw{-be}
  23. \dd Don't stop batchfile processing on errors.
  24. \dt \cw{-v}
  25. \dd Show verbose messages.
  26. \dt \cw{-load} \e{session}
  27. \dd Load settings from saved session.
  28. \dt \cw{-P} \e{port}
  29. \dd Connect to port \e{port}.
  30. \dt \cw{\-proxycmd} \e{command}
  31. \dd Instead of making a TCP connection, use \e{command} as a proxy;
  32. network traffic will be redirected to the standard input and output
  33. of \e{command}. \e{command} must be a single word, so is likely to
  34. need quoting by the shell.
  35. \lcont{
  36. The special strings \cw{%host} and \cw{%port} in \e{command} will be
  37. replaced by the hostname and port number you want to connect to; to get
  38. a literal \c{%} sign, enter \c{%%}.
  39. Backslash escapes are also supported, such as sequences like \c{\\n}
  40. being replaced by a literal newline; to get a literal backslash,
  41. enter \c{\\\\}. (Further escaping may be required by the shell.)
  42. (See the main PuTTY manual for full details of the supported \cw{%}-
  43. and backslash-delimited tokens, although most of them are probably not
  44. very useful in this context.)
  45. }
  46. \dt \cw{-l} \e{user}
  47. \dd Set remote username to \e{user}.
  48. \dt \cw{-batch}
  49. \dd Disable interactive prompts.
  50. \dt \cw{-pw} \e{password}
  51. \dd Set remote password to \e{password}. \e{CAUTION:} this will likely
  52. make the password visible to other users of the local machine (via
  53. commands such as \q{\c{w}}).
  54. \dt \cw{-1}
  55. \dd Force use of SSH protocol version 1.
  56. \dt \cw{-2}
  57. \dd Force use of SSH protocol version 2.
  58. \dt \cw{-4}, \cw{-6}
  59. \dd Force use of IPv4 or IPv6 for network connections.
  60. \dt \cw{-C}
  61. \dd Enable SSH compression.
  62. \dt \cw{-i} \e{keyfile}
  63. \dd Private key file for user authentication. For SSH-2 keys, this key
  64. file must be in PuTTY's PPK format, not OpenSSH's format or anyone
  65. else's.
  66. \lcont{ If you are using an authentication agent, you can also specify
  67. a \e{public} key here (in RFC 4716 or OpenSSH format), to identify
  68. which of the agent's keys to use. }
  69. \dt \cw{\-noagent}
  70. \dd Don't try to use an authentication agent.
  71. \dt \cw{\-agent}
  72. \dd Allow use of an authentication agent. (This option is only necessary
  73. to override a setting in a saved session.)
  74. \dt \cw{\-hostkey} \e{key}
  75. \dd Specify an acceptable host public key. This option may be specified
  76. multiple times; each key can be either a fingerprint (\cw{99:aa:bb:...}) or
  77. a base64-encoded blob in OpenSSH's one-line format.
  78. \lcont{ Specifying this option overrides automated host key
  79. management; \e{only} the key(s) specified on the command-line will be
  80. accepted (unless a saved session also overrides host keys, in which
  81. case those will be added to), and the host key cache will not be
  82. written. }
  83. \dt \cw{\-sshlog} \e{logfile}
  84. \dt \cw{\-sshrawlog} \e{logfile}
  85. \dd These options make \cw{psftp} log protocol details to a file.
  86. (Some of these may be sensitive, although by default an effort is made
  87. to suppress obvious passwords.)
  88. \lcont{
  89. \cw{\-sshlog} logs decoded SSH packets and other events (those that
  90. \cw{\-v} would print). \cw{\-sshrawlog} additionally logs the raw
  91. encrypted packet data.
  92. }
  93. \S{psftp-manpage-commands} COMMANDS
  94. For a list of commands available inside \cw{psftp}, type \cw{help}
  95. at the \cw{psftp>} prompt.
  96. \S{psftp-manpage-more-information} MORE INFORMATION
  97. For more information on \cw{psftp} it's probably best to go and look at
  98. the manual on the PuTTY web page:
  99. \cw{https://www.chiark.greenend.org.uk/~sgtatham/putty/}
  100. \S{psftp-manpage-bugs} BUGS
  101. This man page isn't terribly complete. See the above web link for
  102. better documentation.