man-pl.but 7.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268
  1. \cfg{man-identity}{plink}{1}{2004-03-24}{PuTTY tool suite}{PuTTY tool suite}
  2. \H{plink-manpage} Man page for Plink
  3. \S{plink-manpage-name} NAME
  4. \cw{plink} \- PuTTY link, command line network connection tool
  5. \S{plink-manpage-synopsis} SYNOPSIS
  6. \c plink [options] [user@]host [command]
  7. \e bbbbb iiiiiii iiiib iiii iiiiiii
  8. \S{plink-manpage-description} DESCRIPTION
  9. \cw{plink} is a network connection tool supporting several protocols.
  10. \S{plink-manpage-options} OPTIONS
  11. The command-line options supported by \cw{plink} are:
  12. \dt \cw{-V}
  13. \dd Show version information and exit.
  14. \dt \cw{-pgpfp}
  15. \dd Display the fingerprints of the PuTTY PGP Master Keys and exit,
  16. to aid in verifying new files released by the PuTTY team.
  17. \dt \cw{-v}
  18. \dd Show verbose messages.
  19. \dt \cw{-load} \e{session}
  20. \dd Load settings from saved session.
  21. \dt \cw{-ssh}
  22. \dd Force use of SSH protocol (default).
  23. \dt \cw{-telnet}
  24. \dd Force use of Telnet protocol.
  25. \dt \cw{-rlogin}
  26. \dd Force use of rlogin protocol.
  27. \dt \cw{-raw}
  28. \dd Force raw mode.
  29. \dt \cw{-serial}
  30. \dd Force serial mode.
  31. \dt \cw{\-proxycmd} \e{command}
  32. \dd Instead of making a TCP connection, use \e{command} as a proxy;
  33. network traffic will be redirected to the standard input and output
  34. of \e{command}. \e{command} must be a single word, so is likely to
  35. need quoting by the shell.
  36. \lcont{
  37. The special strings \cw{%host} and \cw{%port} in \e{command} will be
  38. replaced by the hostname and port number you want to connect to; to get
  39. a literal \c{%} sign, enter \c{%%}.
  40. Backslash escapes are also supported, such as sequences like \c{\\n}
  41. being replaced by a literal newline; to get a literal backslash,
  42. enter \c{\\\\}. (Further escaping may be required by the shell.)
  43. (See the main PuTTY manual for full details of the supported \cw{%}-
  44. and backslash-delimited tokens, although most of them are probably not
  45. very useful in this context.)
  46. }
  47. \dt \cw{-P} \e{port}
  48. \dd Connect to port \e{port}.
  49. \dt \cw{-l} \e{user}
  50. \dd Set remote username to \e{user}.
  51. \dt \cw{-m} \e{path}
  52. \dd Read remote command(s) from local file \e{path}.
  53. \dt \cw{-batch}
  54. \dd Disable interactive prompts.
  55. \dt \cw{-pw} \e{password}
  56. \dd Set remote password to \e{password}. \e{CAUTION:} this will likely
  57. make the password visible to other users of the local machine (via
  58. commands such as \q{\c{w}}).
  59. \dt \cw{\-L} \cw{[}\e{srcaddr}\cw{:]}\e{srcport}\cw{:}\e{desthost}\cw{:}\e{destport}
  60. \dd Set up a local port forwarding: listen on \e{srcport} (or
  61. \e{srcaddr}:\e{srcport} if specified), and forward any connections
  62. over the SSH connection to the destination address
  63. \e{desthost}:\e{destport}. Only works in SSH.
  64. \dt \cw{\-R} \cw{[}\e{srcaddr}\cw{:]}\e{srcport}\cw{:}\e{desthost}\cw{:}\e{destport}
  65. \dd Set up a remote port forwarding: ask the SSH server to listen on
  66. \e{srcport} (or \e{srcaddr}:\e{srcport} if specified), and to
  67. forward any connections back over the SSH connection where the
  68. client will pass them on to the destination address
  69. \e{desthost}:\e{destport}. Only works in SSH.
  70. \dt \cw{\-D} [\e{srcaddr}:]\e{srcport}
  71. \dd Set up dynamic port forwarding. The client listens on
  72. \e{srcport} (or \e{srcaddr}:\e{srcport} if specified), and
  73. implements a SOCKS server. So you can point SOCKS-aware applications
  74. at this port and they will automatically use the SSH connection to
  75. tunnel all their connections. Only works in SSH.
  76. \dt \cw{-X}
  77. \dd Enable X11 forwarding.
  78. \dt \cw{-x}
  79. \dd Disable X11 forwarding (default).
  80. \dt \cw{-A}
  81. \dd Enable agent forwarding.
  82. \dt \cw{-a}
  83. \dd Disable agent forwarding (default).
  84. \dt \cw{-t}
  85. \dd Enable pty allocation (default if a command is NOT specified).
  86. \dt \cw{-T}
  87. \dd Disable pty allocation (default if a command is specified).
  88. \dt \cw{-1}
  89. \dd Force use of SSH protocol version 1.
  90. \dt \cw{-2}
  91. \dd Force use of SSH protocol version 2.
  92. \dt \cw{-4}, \cw{-6}
  93. \dd Force use of IPv4 or IPv6 for network connections.
  94. \dt \cw{-C}
  95. \dd Enable SSH compression.
  96. \dt \cw{-i} \e{keyfile}
  97. \dd Private key file for user authentication. For SSH-2 keys, this key
  98. file must be in PuTTY's PPK format, not OpenSSH's format or anyone
  99. else's.
  100. \lcont{ If you are using an authentication agent, you can also specify
  101. a \e{public} key here (in RFC 4716 or OpenSSH format), to identify
  102. which of the agent's keys to use. }
  103. \dt \cw{\-noagent}
  104. \dd Don't try to use an authentication agent for local authentication.
  105. (This doesn't affect agent forwarding.)
  106. \dt \cw{\-agent}
  107. \dd Allow use of an authentication agent. (This option is only necessary
  108. to override a setting in a saved session.)
  109. \dt \cw{\-hostkey} \e{key}
  110. \dd Specify an acceptable host public key. This option may be specified
  111. multiple times; each key can be either a fingerprint (\cw{99:aa:bb:...}) or
  112. a base64-encoded blob in OpenSSH's one-line format.
  113. \lcont{ Specifying this option overrides automated host key
  114. management; \e{only} the key(s) specified on the command-line will be
  115. accepted (unless a saved session also overrides host keys, in which
  116. case those will be added to), and the host key cache will not be
  117. written. }
  118. \dt \cw{-s}
  119. \dd Remote command is SSH subsystem (SSH-2 only).
  120. \dt \cw{-N}
  121. \dd Don't start a remote command or shell at all (SSH-2 only).
  122. \dt \cw{\-nc} \e{host}:\e{port}
  123. \dd Make a remote network connection from the server instead of
  124. starting a shell or command.
  125. \dt \cw{\-sercfg} \e{configuration-string}
  126. \dd Specify the configuration parameters for the serial port, in
  127. \cw{-serial} mode. \e{configuration-string} should be a
  128. comma-separated list of configuration parameters as follows:
  129. \lcont{
  130. \b Any single digit from 5 to 9 sets the number of data bits.
  131. \b \cq{1}, \cq{1.5} or \cq{2} sets the number of stop bits.
  132. \b Any other numeric string is interpreted as a baud rate.
  133. \b A single lower-case letter specifies the parity: \cq{n} for none,
  134. \cq{o} for odd, \cq{e} for even, \cq{m} for mark and \cq{s} for space.
  135. \b A single upper-case letter specifies the flow control: \cq{N} for
  136. none, \cq{X} for XON/XOFF, \cq{R} for RTS/CTS and \cq{D} for
  137. DSR/DTR.
  138. }
  139. \dt \cw{\-sshlog} \e{logfile}
  140. \dt \cw{\-sshrawlog} \e{logfile}
  141. \dd For SSH connections, these options make \cw{plink} log protocol
  142. details to a file. (Some of these may be sensitive, although by default
  143. an effort is made to suppress obvious passwords.)
  144. \lcont{
  145. \cw{\-sshlog} logs decoded SSH packets and other events (those that
  146. \cw{\-v} would print). \cw{\-sshrawlog} additionally logs the raw
  147. encrypted packet data.
  148. }
  149. \dt \cw{\-shareexists}
  150. \dd Instead of making a new connection, test for the presence of an
  151. existing connection that can be shared. The desired session can be
  152. specified in any of the usual ways.
  153. \lcont{
  154. Returns immediately with a zero exit status if a suitable \q{upstream}
  155. exists, nonzero otherwise.
  156. }
  157. \S{plink-manpage-more-information} MORE INFORMATION
  158. For more information on plink, it's probably best to go and look at
  159. the manual on the PuTTY web page:
  160. \W{https://www.chiark.greenend.org.uk/~sgtatham/putty/}\cw{https://www.chiark.greenend.org.uk/~sgtatham/putty/}
  161. \S{plink-manpage-bugs} BUGS
  162. This man page isn't terribly complete. See the above web link for
  163. better documentation.