faq.but 72 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581
  1. \A{faq} PuTTY \i{FAQ}
  2. This FAQ is published on the PuTTY web site, and also provided as an
  3. appendix in the manual.
  4. \H{faq-intro} Introduction
  5. \S{faq-what}{Question} What is PuTTY?
  6. PuTTY is a client program for the SSH, Telnet and Rlogin network
  7. protocols.
  8. These protocols are all used to run a remote session on a computer,
  9. over a network. PuTTY implements the client end of that session: the
  10. end at which the session is displayed, rather than the end at which
  11. it runs.
  12. In really simple terms: you run PuTTY on a Windows machine, and tell
  13. it to connect to (for example) a Unix machine. PuTTY opens a window.
  14. Then, anything you type into that window is sent straight to the
  15. Unix machine, and everything the Unix machine sends back is
  16. displayed in the window. So you can work on the Unix machine as if
  17. you were sitting at its console, while actually sitting somewhere
  18. else.
  19. \H{faq-support} Features supported in PuTTY
  20. \I{supported features}In general, if you want to know if PuTTY supports
  21. a particular feature, you should look for it on the
  22. \W{https://www.chiark.greenend.org.uk/~sgtatham/putty/}{PuTTY web site}.
  23. In particular:
  24. \b try the
  25. \W{https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html}{changes
  26. page}, and see if you can find the feature on there. If a feature is
  27. listed there, it's been implemented. If it's listed as a change made
  28. \e{since} the latest version, it should be available in the
  29. development snapshots, in which case testing will be very welcome.
  30. \b try the
  31. \W{https://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/}{Wishlist
  32. page}, and see if you can find the feature there. If it's on there,
  33. and not in the \q{Recently fixed} section, it probably \e{hasn't} been
  34. implemented.
  35. \S{faq-ssh2}{Question} Does PuTTY support SSH-2?
  36. Yes. SSH-2 support has been available in PuTTY since version 0.50.
  37. Public key authentication (both RSA and DSA) in SSH-2 is new in
  38. version 0.52.
  39. \S{faq-ssh2-keyfmt}{Question} Does PuTTY support reading OpenSSH or
  40. \cw{ssh.com} SSH-2 private key files?
  41. PuTTY doesn't support this natively (see
  42. \W{https://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/key-formats-natively.html}{the wishlist entry}
  43. for reasons why not), but as of 0.53
  44. PuTTYgen can convert both OpenSSH and \cw{ssh.com} private key
  45. files into PuTTY's format.
  46. \S{faq-ssh1}{Question} Does PuTTY support SSH-1?
  47. Yes. SSH-1 support has always been available in PuTTY.
  48. However, the SSH-1 protocol has many weaknesses and is no longer
  49. considered secure; you should use SSH-2 instead if at all possible.
  50. As of 0.68, PuTTY will no longer fall back to SSH-1 if the server
  51. doesn't appear to support SSH-2; you must explicitly ask for SSH-1.
  52. \S{faq-localecho}{Question} Does PuTTY support \i{local echo}?
  53. Yes. Version 0.52 has proper support for local echo.
  54. In version 0.51 and before, local echo could not be separated from
  55. local line editing (where you type a line of text locally, and it is
  56. not sent to the server until you press Return, so you have the
  57. chance to edit it and correct mistakes \e{before} the server sees
  58. it). New in version 0.52, local echo and local line editing are
  59. separate options, and by default PuTTY will try to determine
  60. automatically whether to enable them or not, based on which protocol
  61. you have selected and also based on hints from the server. If you
  62. have a problem with PuTTY's default choice, you can force each
  63. option to be enabled or disabled as you choose. The controls are in
  64. the Terminal panel, in the section marked \q{Line discipline
  65. options}.
  66. \S{faq-savedsettings}{Question} Does PuTTY support storing settings,
  67. so I don't have to change them every time?
  68. Yes, all of PuTTY's settings can be saved in named session profiles.
  69. You can also change the default settings that are used for new sessions.
  70. See \k{config-saving} in the documentation for how to do this.
  71. \S{faq-disksettings}{Question} Does PuTTY support storing its
  72. settings in a disk file?
  73. Not at present, although \k{config-file} in the documentation gives
  74. a method of achieving the same effect.
  75. \S{faq-fullscreen}{Question} Does PuTTY support full-screen mode,
  76. like a DOS box?
  77. Yes; this is a new feature in version 0.52.
  78. \S{faq-password-remember}{Question} Does PuTTY have the ability to
  79. \i{remember my password} so I don't have to type it every time?
  80. No, it doesn't.
  81. Remembering your password is a bad plan for obvious security
  82. reasons: anyone who gains access to your machine while you're away
  83. from your desk can find out the remembered password, and use it,
  84. abuse it or change it.
  85. In addition, it's not even \e{possible} for PuTTY to automatically
  86. send your password in a Telnet session, because Telnet doesn't give
  87. the client software any indication of which part of the login
  88. process is the password prompt. PuTTY would have to guess, by
  89. looking for words like \q{password} in the session data; and if your
  90. login program is written in something other than English, this won't
  91. work.
  92. In SSH, remembering your password would be possible in theory, but
  93. there doesn't seem to be much point since SSH supports public key
  94. authentication, which is more flexible and more secure. See
  95. \k{pubkey} in the documentation for a full discussion of public key
  96. authentication.
  97. \S{faq-hostkeys}{Question} Is there an option to turn off the
  98. \I{verifying the host key}annoying host key prompts?
  99. No, there isn't. And there won't be. Even if you write it yourself
  100. and send us the patch, we won't accept it.
  101. Those annoying host key prompts are the \e{whole point} of SSH.
  102. Without them, all the cryptographic technology SSH uses to secure
  103. your session is doing nothing more than making an attacker's job
  104. slightly harder; instead of sitting between you and the server with
  105. a packet sniffer, the attacker must actually subvert a router and
  106. start modifying the packets going back and forth. But that's not all
  107. that much harder than just sniffing; and without host key checking,
  108. it will go completely undetected by client or server.
  109. Host key checking is your guarantee that the encryption you put on
  110. your data at the client end is the \e{same} encryption taken off the
  111. data at the server end; it's your guarantee that it hasn't been
  112. removed and replaced somewhere on the way. Host key checking makes
  113. the attacker's job \e{astronomically} hard, compared to packet
  114. sniffing, and even compared to subverting a router. Instead of
  115. applying a little intelligence and keeping an eye on Bugtraq, the
  116. attacker must now perform a brute-force attack against at least one
  117. military-strength cipher. That insignificant host key prompt really
  118. does make \e{that} much difference.
  119. If you're having a specific problem with host key checking - perhaps
  120. you want an automated batch job to make use of PSCP or Plink, and the
  121. interactive host key prompt is hanging the batch process - then the
  122. right way to fix it is to add the correct host key to the Registry in
  123. advance, or if the Registry is not available, to use the \cw{-hostkey}
  124. command-line option. That way, you retain the \e{important} feature of
  125. host key checking: the right key will be accepted and the wrong ones
  126. will not. Adding an option to turn host key checking off completely is
  127. the wrong solution and we will not do it.
  128. If you have host keys available in the common \i\c{known_hosts} format,
  129. we have a script called
  130. \W{https://git.tartarus.org/?p=simon/putty.git;a=blob;f=contrib/kh2reg.py;hb=HEAD}\c{kh2reg.py}
  131. to convert them to a Windows .REG file, which can be installed ahead of
  132. time by double-clicking or using \c{REGEDIT}.
  133. \S{faq-server}{Question} Will you write an SSH server for the PuTTY
  134. suite, to go with the client?
  135. Not one that you'd want to use.
  136. While much of the protocol and networking code can be made common
  137. between a client and server, to make a \e{useful} general-purpose
  138. server requires all sorts of fiddly new code like interacting with OS
  139. authentication databases and the like.
  140. A special-purpose SSH server (called \i{Uppity}) can now be built from
  141. the PuTTY source code, and indeed it is not usable as a
  142. general-purpose server; it exists mainly as a test harness.
  143. If someone else wants to use this as a basis for writing a
  144. general-purpose SSH server, they'd be perfectly welcome to of course;
  145. but we don't have time, and we don't have motivation. The code is
  146. available if anyone else wants to try it.
  147. \S{faq-pscp-ascii}{Question} Can PSCP or PSFTP transfer files in
  148. \i{ASCII} mode?
  149. Unfortunately not.
  150. Until recently, this was a limitation of the file transfer protocols:
  151. the SCP and SFTP protocols had no notion of transferring a file in
  152. anything other than binary mode. (This is still true of SCP.)
  153. The current draft protocol spec of SFTP proposes a means of
  154. implementing ASCII transfer. At some point PSCP/PSFTP may implement
  155. this proposal.
  156. \H{faq-ports} Ports to other operating systems
  157. The eventual goal is for PuTTY to be a multi-platform program, able
  158. to run on at least Windows, Mac OS and Unix.
  159. Porting will become easier once PuTTY has a generalised porting
  160. layer, drawing a clear line between platform-dependent and
  161. platform-independent code. The general intention was for this
  162. porting layer to evolve naturally as part of the process of doing
  163. the first port; a Unix port has now been released and the plan
  164. seems to be working so far.
  165. \S{faq-ports-general}{Question} What ports of PuTTY exist?
  166. Currently, release versions of PuTTY tools only run on Windows
  167. systems and Unix.
  168. As of 0.68, the supplied PuTTY executables run on versions of Windows
  169. from XP onwards, up to and including Windows 10; and we know of no
  170. reason why PuTTY should not continue to work on future versions of
  171. Windows. We provide 32-bit and 64-bit Windows executables; see
  172. \k{faq-32bit-64bit} for discussion of the compatibility issues around
  173. that.
  174. (We used to also provide executables for Windows for the Alpha
  175. processor, but stopped after 0.58 due to lack of interest.)
  176. In the development code, a partial port to Mac OS exists (see
  177. \k{faq-mac-port}).
  178. Currently PuTTY does \e{not} run on Windows CE (see \k{faq-wince}).
  179. We do not have release-quality ports for any other systems at the
  180. present time. If anyone told you we had an Android port, or an iOS
  181. port, or any other port of PuTTY, they were mistaken. We don't.
  182. There are some third-party ports to various platforms, mentioned
  183. on the
  184. \W{https://www.chiark.greenend.org.uk/~sgtatham/putty/links.html}{Links page of our website}.
  185. \S{faq-unix}{Question} \I{Unix version}Is there a port to Unix?
  186. As of 0.54, there are Unix ports of most of the traditional PuTTY
  187. tools, and also one entirely new application.
  188. If you look at the source release, you should find a \c{unix}
  189. subdirectory. There are a couple of ways of building it,
  190. including the usual \c{configure}/\c{make}; see the file \c{README}
  191. in the source distribution. This should build you Unix
  192. ports of Plink, PuTTY itself, PuTTYgen, PSCP, PSFTP, Pageant, and also
  193. \i\c{pterm} - an \cw{xterm}-type program which supports the same
  194. terminal emulation as PuTTY.
  195. If you don't have \i{Gtk}, you should still be able to build the
  196. command-line tools.
  197. \S{faq-unix-why}{Question} What's the point of the Unix port? Unix
  198. has OpenSSH.
  199. All sorts of little things. \c{pterm} is directly useful to anyone
  200. who prefers PuTTY's terminal emulation to \c{xterm}'s, which at
  201. least some people do. Unix Plink has apparently found a niche among
  202. people who find the complexity of OpenSSL makes OpenSSH hard to
  203. install (and who don't mind Plink not having as many features). Some
  204. users want to generate a large number of SSH keys on Unix and then
  205. copy them all into PuTTY, and the Unix PuTTYgen should allow them to
  206. automate that conversion process.
  207. There were development advantages as well; porting PuTTY to Unix was
  208. a valuable path-finding effort for other future ports, and also
  209. allowed us to use the excellent Linux tool
  210. \W{http://valgrind.kde.org/}{Valgrind} to help with debugging, which
  211. has already improved PuTTY's stability on \e{all} platforms.
  212. However, if you're a Unix user and you can see no reason to switch
  213. from OpenSSH to PuTTY/Plink, then you're probably right. We don't
  214. expect our Unix port to be the right thing for everybody.
  215. \S{faq-wince}{Question} Will there be a port to Windows CE or PocketPC?
  216. We once did some work on such a port, but it only reached an early
  217. stage, and certainly not a useful one. It's no longer being actively
  218. worked on.
  219. \S{faq-win31}{Question} Is there a port to \i{Windows 3.1}?
  220. PuTTY is a 32-bit application from the ground up, so it won't run on
  221. Windows 3.1 as a native 16-bit program; and it would be \e{very}
  222. hard to port it to do so, because of Windows 3.1's vile memory
  223. allocation mechanisms.
  224. However, it is possible in theory to compile the existing PuTTY
  225. source in such a way that it will run under \i{Win32s} (an extension to
  226. Windows 3.1 to let you run 32-bit programs). In order to do this
  227. you'll need the right kind of C compiler - modern versions of Visual
  228. C at least have stopped being backwards compatible to Win32s. Also,
  229. the last time we tried this it didn't work very well.
  230. \S{faq-mac-port}{Question} Will there be a port to the \I{Mac OS}Mac?
  231. We hope so!
  232. We attempted one around 2005, written as a native Cocoa application,
  233. but it turned out to be very slow to redraw its window for some reason
  234. we never got to the bottom of.
  235. In 2015, after porting the GTK front end to work with GTK 3, we began
  236. another attempt based on making small changes to the GTK code and
  237. building it against the OS X Quartz version of GTK 3. This doesn't
  238. seem to have the window redrawing problem any more, so it's already
  239. got further than the last effort, but it is still substantially
  240. unfinished.
  241. If any OS X and/or GTK programming experts are keen to have a finished
  242. version of this, we urge them to help out with some of the remaining
  243. problems!
  244. \S{faq-epoc}{Question} Will there be a port to EPOC?
  245. I hope so, but given that ports aren't really progressing very fast
  246. even on systems the developers \e{do} already know how to program
  247. for, it might be a long time before any of us get round to learning
  248. a new system and doing the port for that.
  249. However, some of the work has been done by other people; see the
  250. \W{https://www.chiark.greenend.org.uk/~sgtatham/putty/links.html}{Links page of our website}
  251. for various third-party ports.
  252. \S{faq-iphone}{Question} Will there be a port to the iPhone?
  253. We have no plans to write such a port ourselves; none of us has an
  254. iPhone, and developing and publishing applications for it looks
  255. awkward and expensive.
  256. However, there is a third-party SSH client for the iPhone and
  257. iPod\_Touch called \W{http://www.instantcocoa.com/products/pTerm/}{pTerm},
  258. which is apparently based on PuTTY. (This is nothing to do with our
  259. similarly-named \c{pterm}, which is a standalone terminal emulator for
  260. Unix systems; see \k{faq-unix}.)
  261. \H{faq-embedding} Embedding PuTTY in other programs
  262. \S{faq-dll}{Question} Is the SSH or Telnet code available as a DLL?
  263. No, it isn't. It would take a reasonable amount of rewriting for
  264. this to be possible, and since the PuTTY project itself doesn't
  265. believe in DLLs (they make installation more error-prone) none of us
  266. has taken the time to do it.
  267. Most of the code cleanup work would be a good thing to happen in
  268. general, so if anyone feels like helping, we wouldn't say no.
  269. See also
  270. \W{https://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/dll-frontend.html}{the wishlist entry}.
  271. \S{faq-vb}{Question} Is the SSH or Telnet code available as a Visual
  272. Basic component?
  273. No, it isn't. None of the PuTTY team uses Visual Basic, and none of
  274. us has any particular need to make SSH connections from a Visual
  275. Basic application. In addition, all the preliminary work to turn it
  276. into a DLL would be necessary first; and furthermore, we don't even
  277. know how to write VB components.
  278. If someone offers to do some of this work for us, we might consider
  279. it, but unless that happens I can't see VB integration being
  280. anywhere other than the very bottom of our priority list.
  281. \S{faq-ipc}{Question} How can I use PuTTY to make an SSH connection
  282. from within another program?
  283. Probably your best bet is to use Plink, the command-line connection
  284. tool. If you can start Plink as a second Windows process, and
  285. arrange for your primary process to be able to send data to the
  286. Plink process, and receive data from it, through pipes, then you
  287. should be able to make SSH connections from your program.
  288. This is what CVS for Windows does, for example.
  289. \H{faq-details} Details of PuTTY's operation
  290. \S{faq-term}{Question} What \i{terminal type} does PuTTY use?
  291. For most purposes, PuTTY can be considered to be an \cw{xterm}
  292. terminal.
  293. PuTTY also supports some terminal \i{control sequences} not supported by
  294. the real \cw{xterm}: notably the Linux console sequences that
  295. reconfigure the colour palette, and the title bar control sequences
  296. used by \i\cw{DECterm} (which are different from the \cw{xterm} ones;
  297. PuTTY supports both).
  298. By default, PuTTY announces its terminal type to the server as
  299. \c{xterm}. If you have a problem with this, you can reconfigure it
  300. to say something else; \c{vt220} might help if you have trouble.
  301. \S{faq-settings}{Question} Where does PuTTY store its data?
  302. On Windows, PuTTY stores most of its data (saved sessions, SSH host
  303. keys) in the \i{Registry}. The precise location is
  304. \c HKEY_CURRENT_USER\Software\SimonTatham\PuTTY
  305. and within that area, saved sessions are stored under \c{Sessions}
  306. while host keys are stored under \c{SshHostKeys}.
  307. PuTTY also requires a random number seed file, to improve the
  308. unpredictability of randomly chosen data needed as part of the SSH
  309. cryptography. This is stored by default in a file called \i\c{PUTTY.RND};
  310. this is stored by default in the \q{Application Data} directory,
  311. or failing that, one of a number of fallback locations. If you
  312. want to change the location of the random number seed file, you can
  313. put your chosen pathname in the Registry, at
  314. \c HKEY_CURRENT_USER\Software\SimonTatham\PuTTY\RandSeedFile
  315. You can ask PuTTY to delete all this data; see \k{faq-cleanup}.
  316. On Unix, PuTTY stores all of this data in a directory \cw{~/.putty}
  317. by default.
  318. \S{faq-trust-sigils} Why do small PuTTY icons appear next to the login
  319. prompts?
  320. As of PuTTY 0.71, some lines of text in the terminal window are marked
  321. with a small copy of the PuTTY icon (as far as pixels allow).
  322. This is to show trustworthiness. When the PuTTY icon appears next to a
  323. line of text, it indicates that that line of text was generated by
  324. PuTTY itself, and not generated by the server and sent to PuTTY.
  325. Text that comes from the server does not have this icon, and we've
  326. arranged that the server should not be able to fake it. (There's no
  327. control sequence the server can send which will make PuTTY draw its
  328. own icon, and if the server tries to move the cursor back up to a line
  329. that \e{already} has an icon and overwrite the text, the icon will
  330. disappear.)
  331. This lets you tell the difference between (for example) a legitimate
  332. prompt in which PuTTY itself asks you for your private key passphrase,
  333. and a fake prompt in which the server tries to send the identical text
  334. to trick you into telling \e{it} your private key passphrase.
  335. \S{faq-plink-pause} Why has Plink started saying \q{Press Return to
  336. begin session}?
  337. As of PuTTY 0.71, if you use Plink for an interactive SSH session,
  338. then after the login phase has finished, it will present a final
  339. interactive prompt saying \q{Access granted. Press Return to begin
  340. session}.
  341. This is another defence against servers trying to mimic the real
  342. authentication prompts after the session has started. When you pass
  343. through that prompt, you know that everything after it is generated by
  344. the server and not by Plink itself, so any request for your private
  345. key passphrase should be treated with suspicion.
  346. In Plink, we can't use the defence described in \k{faq-trust-sigils}:
  347. Plink is running \e{in} the terminal, so anything it can write into
  348. the terminal, the server could write in the same way after the session
  349. starts. And we can't just print a separator line without a pause,
  350. because then the server could simply move the cursor back up to it and
  351. overwrite it (probably with a brief flicker, but you might easily miss
  352. that). The only robust defence anyone has come up with involves this
  353. pause.
  354. If you trust your server not to be abusive, you can turn this off. It
  355. will also not appear in various other circumstances where Plink can be
  356. confident it isn't necessary. See \k{plink-option-antispoof} for
  357. details.
  358. \H{faq-howto} HOWTO questions
  359. \S{faq-login}{Question} What login name / password should I use?
  360. This is not a question you should be asking \e{us}.
  361. PuTTY is a communications tool, for making connections to other
  362. computers. We maintain the tool; we \e{don't} administer any computers
  363. that you're likely to be able to use, in the same way that the people
  364. who make web browsers aren't responsible for most of the content you can
  365. view in them. \#{FIXME: less technical analogy?} We cannot help with
  366. questions of this sort.
  367. If you know the name of the computer you want to connect to, but don't
  368. know what login name or password to use, you should talk to whoever
  369. administers that computer. If you don't know who that is, see the next
  370. question for some possible ways to find out.
  371. \# FIXME: some people ask us to provide them with a login name
  372. apparently as random members of the public rather than in the
  373. belief that we run a server belonging to an organisation they already
  374. have some relationship with. Not sure what to say to such people.
  375. \S{faq-commands}{Question} \I{commands on the server}What commands
  376. can I type into my PuTTY terminal window?
  377. Again, this is not a question you should be asking \e{us}. You need
  378. to read the manuals, or ask the administrator, of \e{the computer
  379. you have connected to}.
  380. PuTTY does not process the commands you type into it. It's only a
  381. communications tool. It makes a connection to another computer; it
  382. passes the commands you type to that other computer; and it passes
  383. the other computer's responses back to you. Therefore, the precise
  384. range of commands you can use will not depend on PuTTY, but on what
  385. kind of computer you have connected to and what software is running
  386. on it. The PuTTY team cannot help you with that.
  387. (Think of PuTTY as being a bit like a telephone. If you phone
  388. somebody up and you don't know what language to speak to make them
  389. understand you, it isn't \e{the telephone company}'s job to find
  390. that out for you. We just provide the means for you to get in touch;
  391. making yourself understood is somebody else's problem.)
  392. If you are unsure of where to start looking for the administrator of
  393. your server, a good place to start might be to remember how you
  394. found out the host name in the PuTTY configuration. If you were
  395. given that host name by e-mail, for example, you could try asking
  396. the person who sent you that e-mail. If your company's IT department
  397. provided you with ready-made PuTTY saved sessions, then that IT
  398. department can probably also tell you something about what commands
  399. you can type during those sessions. But the PuTTY maintainer team
  400. does not administer any server you are likely to be connecting to,
  401. and cannot help you with questions of this type.
  402. \S{faq-startmax}{Question} How can I make PuTTY start up \i{maximise}d?
  403. Create a Windows shortcut to start PuTTY from, and set it as \q{Run
  404. Maximized}.
  405. \S{faq-startsess}{Question} How can I create a \i{Windows shortcut} to
  406. start a particular saved session directly?
  407. To run a PuTTY session saved under the name \q{\cw{mysession}},
  408. create a Windows shortcut that invokes PuTTY with a command line
  409. like
  410. \c \path\name\to\putty.exe -load "mysession"
  411. (Note: prior to 0.53, the syntax was \c{@session}. This is now
  412. deprecated and may be removed at some point.)
  413. \S{faq-startssh}{Question} How can I start an SSH session straight
  414. from the command line?
  415. Use the command line \c{putty -ssh host.name}. Alternatively, create
  416. a saved session that specifies the SSH protocol, and start the saved
  417. session as shown in \k{faq-startsess}.
  418. \S{faq-cutpaste}{Question} How do I \i{copy and paste} between PuTTY and
  419. other Windows applications?
  420. Copy and paste works similarly to the X Window System. You use the
  421. left mouse button to select text in the PuTTY window. The act of
  422. selection \e{automatically} copies the text to the clipboard: there
  423. is no need to press Ctrl-Ins or Ctrl-C or anything else. In fact,
  424. pressing Ctrl-C will send a Ctrl-C character to the other end of
  425. your connection (just like it does the rest of the time), which may
  426. have unpleasant effects. The \e{only} thing you need to do, to copy
  427. text to the clipboard, is to select it.
  428. To paste the clipboard contents into a PuTTY window, by default you
  429. click the right mouse button. If you have a three-button mouse and
  430. are used to X applications, you can configure pasting to be done by
  431. the middle button instead, but this is not the default because most
  432. Windows users don't have a middle button at all.
  433. You can also paste by pressing Shift-Ins.
  434. \S{faq-options}{Question} How do I use all PuTTY's features (public
  435. keys, proxying, cipher selection, etc.) in PSCP, PSFTP and Plink?
  436. Most major features (e.g., public keys, port forwarding) are available
  437. through command line options. See the documentation.
  438. Not all features are accessible from the command line yet, although
  439. we'd like to fix this. In the meantime, you can use most of
  440. PuTTY's features if you create a PuTTY saved session, and then use
  441. the name of the saved session on the command line in place of a
  442. hostname. This works for PSCP, PSFTP and Plink (but don't expect
  443. port forwarding in the file transfer applications!).
  444. \S{faq-pscp}{Question} How do I use PSCP.EXE? When I double-click it
  445. gives me a command prompt window which then closes instantly.
  446. PSCP is a command-line application, not a GUI application. If you
  447. run it without arguments, it will simply print a help message and
  448. terminate.
  449. To use PSCP properly, run it from a Command Prompt window. See
  450. \k{pscp} in the documentation for more details.
  451. \S{faq-pscp-spaces}{Question} \I{spaces in filenames}How do I use
  452. PSCP to copy a file whose name has spaces in?
  453. If PSCP is using the traditional SCP protocol, this is confusing. If
  454. you're specifying a file at the local end, you just use one set of
  455. quotes as you would normally do:
  456. \c pscp "local filename with spaces" user@host:
  457. \c pscp user@host:myfile "local filename with spaces"
  458. But if the filename you're specifying is on the \e{remote} side, you
  459. have to use backslashes and two sets of quotes:
  460. \c pscp user@host:"\"remote filename with spaces\"" local_filename
  461. \c pscp local_filename user@host:"\"remote filename with spaces\""
  462. Worse still, in a remote-to-local copy you have to specify the local
  463. file name explicitly, otherwise PSCP will complain that they don't
  464. match (unless you specified the \c{-unsafe} option). The following
  465. command will give an error message:
  466. \c c:\>pscp user@host:"\"oo er\"" .
  467. \c warning: remote host tried to write to a file called 'oo er'
  468. \c when we requested a file called '"oo er"'.
  469. Instead, you need to specify the local file name in full:
  470. \c c:\>pscp user@host:"\"oo er\"" "oo er"
  471. If PSCP is using the newer SFTP protocol, none of this is a problem,
  472. and all filenames with spaces in are specified using a single pair
  473. of quotes in the obvious way:
  474. \c pscp "local file" user@host:
  475. \c pscp user@host:"remote file" .
  476. \S{faq-32bit-64bit}{Question} Should I run the 32-bit or the
  477. 64-bit version?
  478. If you're not sure, the \I{32-bit Windows}32-bit version is generally
  479. the safe option. It will run perfectly well on all processors and on
  480. all versions of Windows that PuTTY supports. PuTTY doesn't require to
  481. run as a 64-bit application to work well, and having a 32-bit PuTTY on
  482. a 64-bit system isn't likely to cause you any trouble.
  483. The 64-bit version (first released in 0.68) will only run if you have
  484. a 64-bit processor \e{and} a \I{64-bit Windows}64-bit edition of
  485. Windows (both of these things are likely to be true of any recent
  486. Windows PC). It will run somewhat faster (in particular, the
  487. cryptography will be faster, especially during link setup), but it
  488. will consume slightly more memory.
  489. If you need to use an external \i{DLL} for GSSAPI authentication, that
  490. DLL may only be available in a 32-bit or 64-bit form, and that will
  491. dictate the version of PuTTY you need to use. (You will probably know
  492. if you're doing this; see \k{config-ssh-auth-gssapi-libraries} in the
  493. documentation.)
  494. \H{faq-trouble} Troubleshooting
  495. \S{faq-pscp-protocol}{Question} Why do I see \q{Fatal: Protocol
  496. error: Expected control record} in PSCP?
  497. This happens because PSCP was expecting to see data from the server
  498. that was part of the PSCP protocol exchange, and instead it saw data
  499. that it couldn't make any sense of at all.
  500. This almost always happens because the \i{startup scripts} in your
  501. account on the server machine are generating output. This is
  502. impossible for PSCP, or any other SCP client, to work around. You
  503. should never use startup files (\c{.bashrc}, \c{.cshrc} and so on)
  504. which generate output in non-interactive sessions.
  505. This is not actually a PuTTY problem. If PSCP fails in this way,
  506. then all other SCP clients are likely to fail in exactly the same
  507. way. The problem is at the server end.
  508. \S{faq-colours}{Question} I clicked on a colour in the \ii{Colours}
  509. panel, and the colour didn't change in my terminal.
  510. That isn't how you're supposed to use the Colours panel.
  511. During the course of a session, PuTTY potentially uses \e{all} the
  512. colours listed in the Colours panel. It's not a question of using
  513. only one of them and you choosing which one; PuTTY will use them
  514. \e{all}. The purpose of the Colours panel is to let you adjust the
  515. appearance of all the colours. So to change the colour of the
  516. cursor, for example, you would select \q{Cursor Colour}, press the
  517. \q{Modify} button, and select a new colour from the dialog box that
  518. appeared. Similarly, if you want your session to appear in green,
  519. you should select \q{Default Foreground} and press \q{Modify}.
  520. Clicking on \q{ANSI Green} won't turn your session green; it will
  521. only allow you to adjust the \e{shade} of green used when PuTTY is
  522. instructed by the server to display green text.
  523. \S{faq-outofmem}{Question} After trying to establish an SSH-2
  524. connection, PuTTY says \q{\ii{Out of memory}} and dies.
  525. If this happens just while the connection is starting up, this often
  526. indicates that for some reason the client and server have failed to
  527. establish a session encryption key. Somehow, they have performed
  528. calculations that should have given each of them the same key, but
  529. have ended up with different keys; so data encrypted by one and
  530. decrypted by the other looks like random garbage.
  531. This causes an \q{out of memory} error because the first encrypted
  532. data PuTTY expects to see is the length of an SSH message. Normally
  533. this will be something well under 100 bytes. If the decryption has
  534. failed, PuTTY will see a completely random length in the region of
  535. two \e{gigabytes}, and will try to allocate enough memory to store
  536. this non-existent message. This will immediately lead to it thinking
  537. it doesn't have enough memory, and panicking.
  538. If this happens to you, it is quite likely to still be a PuTTY bug
  539. and you should report it (although it might be a bug in your SSH
  540. server instead); but it doesn't necessarily mean you've actually run
  541. out of memory.
  542. \S{faq-outofmem2}{Question} When attempting a file transfer, either
  543. PSCP or PSFTP says \q{\ii{Out of memory}} and dies.
  544. This is almost always caused by your \i{login scripts} on the server
  545. generating output. PSCP or PSFTP will receive that output when they
  546. were expecting to see the start of a file transfer protocol, and
  547. they will attempt to interpret the output as file-transfer protocol.
  548. This will usually lead to an \q{out of memory} error for much the
  549. same reasons as given in \k{faq-outofmem}.
  550. This is a setup problem in your account on your server, \e{not} a
  551. PSCP/PSFTP bug. Your login scripts should \e{never} generate output
  552. during non-interactive sessions; secure file transfer is not the
  553. only form of remote access that will break if they do.
  554. On Unix, a simple fix is to ensure that all the parts of your login
  555. script that might generate output are in \c{.profile} (if you use a
  556. Bourne shell derivative) or \c{.login} (if you use a C shell).
  557. Putting them in more general files such as \c{.bashrc} or \c{.cshrc}
  558. is liable to lead to problems.
  559. \S{faq-psftp-slow}{Question} PSFTP transfers files much slower than PSCP.
  560. The throughput of PSFTP 0.54 should be much better than 0.53b and
  561. prior; we've added code to the SFTP backend to queue several blocks
  562. of data rather than waiting for an acknowledgement for each. (The
  563. SCP backend did not suffer from this performance issue because SCP
  564. is a much simpler protocol.)
  565. \S{faq-bce}{Question} When I run full-colour applications, I see
  566. areas of black space where colour ought to be, or vice versa.
  567. You almost certainly need to change the \q{Use \i{background colour} to
  568. erase screen} setting in the Terminal panel. If there is too much
  569. black space (the commoner situation), you should enable it, while if
  570. there is too much colour, you should disable it. (See \k{config-erase}.)
  571. In old versions of PuTTY, this was disabled by default, and would not
  572. take effect until you reset the terminal (see \k{faq-resetterm}).
  573. Since 0.54, it is enabled by default, and changes take effect
  574. immediately.
  575. \S{faq-resetterm}{Question} When I change some terminal settings,
  576. nothing happens.
  577. Some of the terminal options (notably \ii{Auto Wrap} and
  578. background-colour screen erase) actually represent the \e{default}
  579. setting, rather than the currently active setting. The server can
  580. send sequences that modify these options in mid-session, but when
  581. the terminal is reset (by server action, or by you choosing \q{Reset
  582. Terminal} from the System menu) the defaults are restored.
  583. In versions 0.53b and prior, if you change one of these options in
  584. the middle of a session, you will find that the change does not
  585. immediately take effect. It will only take effect once you reset
  586. the terminal.
  587. In version 0.54, the behaviour has changed - changes to these
  588. settings take effect immediately.
  589. \S{faq-idleout}{Question} My PuTTY sessions unexpectedly close after
  590. they are \I{idle connections}idle for a while.
  591. Some types of \i{firewall}, and almost any router doing Network Address
  592. Translation (\i{NAT}, also known as IP masquerading), will forget about
  593. a connection through them if the connection does nothing for too
  594. long. This will cause the connection to be rudely cut off when
  595. contact is resumed.
  596. You can try to combat this by telling PuTTY to send \e{keepalives}:
  597. packets of data which have no effect on the actual session, but
  598. which reassure the router or firewall that the network connection is
  599. still active and worth remembering about.
  600. Keepalives don't solve everything, unfortunately; although they
  601. cause greater robustness against this sort of router, they can also
  602. cause a \e{loss} of robustness against network dropouts. See
  603. \k{config-keepalive} in the documentation for more discussion of
  604. this.
  605. \S{faq-timeout}{Question} PuTTY's network connections time out too
  606. quickly when \I{breaks in connectivity}network connectivity is
  607. temporarily lost.
  608. This is a Windows problem, not a PuTTY problem. The timeout value
  609. can't be set on per application or per session basis. To increase
  610. the TCP timeout globally, you need to tinker with the Registry.
  611. On Windows 95, 98 or ME, the registry key you need to create or
  612. change is
  613. \c HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\VxD\
  614. \c MSTCP\MaxDataRetries
  615. (it must be of type DWORD in Win95, or String in Win98/ME).
  616. (See MS Knowledge Base article
  617. \W{http://support.microsoft.com/default.aspx?scid=kb;en-us;158474}{158474}
  618. for more information.)
  619. On Windows NT, 2000, or XP, the registry key to create or change is
  620. \c HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\
  621. \c Parameters\TcpMaxDataRetransmissions
  622. and it must be of type DWORD.
  623. (See MS Knowledge Base articles
  624. \W{http://support.microsoft.com/default.aspx?scid=kb;en-us;120642}{120642}
  625. and
  626. \W{http://support.microsoft.com/default.aspx?scid=kb;en-us;314053}{314053}
  627. for more information.)
  628. Set the key's value to something like 10. This will cause Windows to
  629. try harder to keep connections alive instead of abandoning them.
  630. \S{faq-puttyputty}{Question} When I \cw{cat} a binary file, I get
  631. \q{PuTTYPuTTYPuTTY} on my command line.
  632. Don't do that, then.
  633. This is designed behaviour; when PuTTY receives the character
  634. Control-E from the remote server, it interprets it as a request to
  635. identify itself, and so it sends back the string \q{\cw{PuTTY}} as
  636. if that string had been entered at the keyboard. Control-E should
  637. only be sent by programs that are prepared to deal with the
  638. response. Writing a binary file to your terminal is likely to output
  639. many Control-E characters, and cause this behaviour. Don't do it.
  640. It's a bad plan.
  641. To mitigate the effects, you could configure the answerback string
  642. to be empty (see \k{config-answerback}); but writing binary files to
  643. your terminal is likely to cause various other unpleasant behaviour,
  644. so this is only a small remedy.
  645. \S{faq-wintitle}{Question} When I \cw{cat} a binary file, my \i{window
  646. title} changes to a nonsense string.
  647. Don't do that, then.
  648. It is designed behaviour that PuTTY should have the ability to
  649. adjust the window title on instructions from the server. Normally
  650. the control sequence that does this should only be sent
  651. deliberately, by programs that know what they are doing and intend
  652. to put meaningful text in the window title. Writing a binary file to
  653. your terminal runs the risk of sending the same control sequence by
  654. accident, and cause unexpected changes in the window title. Don't do
  655. it.
  656. \S{faq-password-fails}{Question} My \i{keyboard} stops working once
  657. PuTTY displays the \i{password prompt}.
  658. No, it doesn't. PuTTY just doesn't display the password you type, so
  659. that someone looking at your screen can't see what it is.
  660. Unlike the Windows login prompts, PuTTY doesn't display the password
  661. as a row of asterisks either. This is so that someone looking at
  662. your screen can't even tell how \e{long} your password is, which
  663. might be valuable information.
  664. \S{faq-keyboard}{Question} One or more \I{keyboard}\i{function keys}
  665. don't do what I expected in a server-side application.
  666. If you've already tried all the relevant options in the PuTTY
  667. Keyboard panel, you may need to mail the PuTTY maintainers and ask.
  668. It is \e{not} usually helpful just to tell us which application,
  669. which server operating system, and which key isn't working; in order
  670. to replicate the problem we would need to have a copy of every
  671. operating system, and every application, that anyone has ever
  672. complained about.
  673. PuTTY responds to function key presses by sending a sequence of
  674. control characters to the server. If a function key isn't doing what
  675. you expect, it's likely that the character sequence your application
  676. is expecting to receive is not the same as the one PuTTY is sending.
  677. Therefore what we really need to know is \e{what} sequence the
  678. application is expecting.
  679. The simplest way to investigate this is to find some other terminal
  680. environment, in which that function key \e{does} work; and then
  681. investigate what sequence the function key is sending in that
  682. situation. One reasonably easy way to do this on a \i{Unix} system is to
  683. type the command \i\c{cat}, and then press the function key. This is
  684. likely to produce output of the form \c{^[[11~}. You can also do
  685. this in PuTTY, to find out what sequence the function key is
  686. producing in that. Then you can mail the PuTTY maintainers and tell
  687. us \q{I wanted the F1 key to send \c{^[[11~}, but instead it's
  688. sending \c{^[OP}, can this be done?}, or something similar.
  689. You should still read the
  690. \W{https://www.chiark.greenend.org.uk/~sgtatham/putty/feedback.html}{Feedback
  691. page} on the PuTTY website (also provided as \k{feedback} in the
  692. manual), and follow the guidelines contained in that.
  693. \S{faq-ssh2key-ssh1conn}{Question} Why do I see \q{Couldn't load
  694. private key from ...}? Why can PuTTYgen load my key but not PuTTY?
  695. It's likely that you've generated an SSH protocol 2 key with PuTTYgen,
  696. but you're trying to use it in an SSH-1 connection. SSH-1 and SSH-2 keys
  697. have different formats, and (at least in 0.52) PuTTY's reporting of a
  698. key in the wrong format isn't optimal.
  699. To connect using SSH-2 to a server that supports both versions, you
  700. need to change the configuration from the default (see \k{faq-ssh2}).
  701. \S{faq-rh8-utf8}{Question} When I'm connected to a \i{Red Hat Linux} 8.0
  702. system, some characters don't display properly.
  703. A common complaint is that hyphens in man pages show up as a-acute.
  704. With release 8.0, Red Hat appear to have made \i{UTF-8} the default
  705. character set. There appears to be no way for terminal emulators such
  706. as PuTTY to know this (as far as we know, the appropriate escape
  707. sequence to switch into UTF-8 mode isn't sent).
  708. A fix is to configure sessions to RH8 systems to use UTF-8
  709. translation - see \k{config-charset} in the documentation. (Note that
  710. if you use \q{Change Settings}, changes may not take place immediately
  711. - see \k{faq-resetterm}.)
  712. If you really want to change the character set used by the server, the
  713. right place is \c{/etc/sysconfig/i18n}, but this shouldn't be
  714. necessary.
  715. \S{faq-screen}{Question} Since I upgraded to PuTTY 0.54, the
  716. scrollback has stopped working when I run \c{screen}.
  717. PuTTY's terminal emulator has always had the policy that when the
  718. \q{\i{alternate screen}} is in use, nothing is added to the scrollback.
  719. This is because the usual sorts of programs which use the alternate
  720. screen are things like text editors, which tend to scroll back and
  721. forth in the same document a lot; so (a) they would fill up the
  722. scrollback with a large amount of unhelpfully disordered text, and
  723. (b) they contain their \e{own} method for the user to scroll back to
  724. the bit they were interested in. We have generally found this policy
  725. to do the Right Thing in almost all situations.
  726. Unfortunately, \c{screen} is one exception: it uses the alternate
  727. screen, but it's still usually helpful to have PuTTY's scrollback
  728. continue working. The simplest solution is to go to the Features
  729. control panel and tick \q{Disable switching to alternate terminal
  730. screen}. (See \k{config-features-altscreen} for more details.)
  731. Alternatively, you can tell \c{screen} itself not to use the
  732. alternate screen: the
  733. \W{http://www4.informatik.uni-erlangen.de/~jnweiger/screen-faq.html}{\c{screen}
  734. FAQ} suggests adding the line \cq{termcapinfo xterm ti@:te@} to your
  735. \cw{.screenrc} file.
  736. The reason why this only started to be a problem in 0.54 is because
  737. \c{screen} typically uses an unusual control sequence to switch to
  738. the alternate screen, and previous versions of PuTTY did not support
  739. this sequence.
  740. \S{faq-alternate-localhost}{Question} Since I upgraded \i{Windows XP}
  741. to Service Pack 2, I can't use addresses like \cw{127.0.0.2}.
  742. Some people who ask PuTTY to listen on \i{localhost} addresses other
  743. than \cw{127.0.0.1} to forward services such as \i{SMB} and \i{Windows
  744. Terminal Services} have found that doing so no longer works since
  745. they upgraded to WinXP SP2.
  746. This is apparently an issue with SP2 that is acknowledged by Microsoft
  747. in MS Knowledge Base article
  748. \W{http://support.microsoft.com/default.aspx?scid=kb;en-us;884020}{884020}.
  749. The article links to a fix you can download.
  750. (\e{However}, we've been told that SP2 \e{also} fixes the bug that
  751. means you need to use non-\cw{127.0.0.1} addresses to forward
  752. Terminal Services in the first place.)
  753. \S{faq-missing-slash}{Question} PSFTP commands seem to be missing a
  754. directory separator (slash).
  755. Some people have reported the following incorrect behaviour with
  756. PSFTP:
  757. \c psftp> pwd
  758. \e iii
  759. \c Remote directory is /dir1/dir2
  760. \c psftp> get filename.ext
  761. \e iiiiiiiiiiiiiiii
  762. \c /dir1/dir2filename.ext: no such file or directory
  763. This is not a bug in PSFTP. There is a known bug in some versions of
  764. portable \i{OpenSSH}
  765. (\W{http://bugzilla.mindrot.org/show_bug.cgi?id=697}{bug 697}) that
  766. causes these symptoms; it appears to have been introduced around
  767. 3.7.x. It manifests only on certain platforms (AIX is what has been
  768. reported to us).
  769. There is a patch for OpenSSH attached to that bug; it's also fixed in
  770. recent versions of portable OpenSSH (from around 3.8).
  771. \S{faq-connaborted}{Question} Do you want to hear about \q{Software
  772. caused connection abort}?
  773. In the documentation for PuTTY 0.53 and 0.53b, we mentioned that we'd
  774. like to hear about any occurrences of this error. Since the release
  775. of PuTTY 0.54, however, we've been convinced that this error doesn't
  776. indicate that PuTTY's doing anything wrong, and we don't need to hear
  777. about further occurrences. See \k{errors-connaborted} for our current
  778. documentation of this error.
  779. \S{faq-rekey}{Question} My SSH-2 session \I{locking up, SSH-2
  780. sessions}locks up for a few seconds every so often.
  781. Recent versions of PuTTY automatically initiate \i{repeat key
  782. exchange} once per hour, to improve session security. If your client
  783. or server machine is slow, you may experience this as a delay of
  784. anything up to thirty seconds or so.
  785. These \I{delays, in SSH-2 sessions}delays are inconvenient, but they
  786. are there for your protection. If they really cause you a problem,
  787. you can choose to turn off periodic rekeying using the \q{Kex}
  788. configuration panel (see \k{config-ssh-kex}), but be aware that you
  789. will be sacrificing security for this. (Falling back to SSH-1 would
  790. also remove the delays, but would lose a \e{lot} more security
  791. still. We do not recommend it.)
  792. \S{faq-xpwontrun}{Question} PuTTY fails to start up. Windows claims that
  793. \q{the application configuration is incorrect}.
  794. This is caused by a bug in certain versions of \i{Windows XP} which
  795. is triggered by PuTTY 0.58. This was fixed in 0.59. The
  796. \W{https://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/xp-wont-run}{\q{xp-wont-run}}
  797. entry in PuTTY's wishlist has more details.
  798. \S{faq-system32}{Question} When I put 32-bit PuTTY in
  799. \cw{C:\\WINDOWS\\\i{SYSTEM32}} on my \i{64-bit Windows} system,
  800. \i{\q{Duplicate Session}} doesn't work.
  801. The short answer is not to put the PuTTY executables in that location.
  802. On 64-bit systems, \cw{C:\\WINDOWS\\SYSTEM32} is intended to contain
  803. only 64-bit binaries; Windows' 32-bit binaries live in
  804. \cw{C:\\WINDOWS\\SYSWOW64}. When a 32-bit PuTTY executable runs
  805. on a 64-bit system, it cannot by default see the \q{real}
  806. \cw{C:\\WINDOWS\\SYSTEM32} at all, because the
  807. \W{http://msdn.microsoft.com/en-us/library/aa384187(v=vs.85).aspx}{File
  808. System Redirector} arranges that the running program sees the
  809. appropriate kind of binaries in \cw{SYSTEM32}. Thus, operations in
  810. the PuTTY suite that involve it accessing its own executables, such as
  811. \i{\q{New Session}} and \q{Duplicate Session}, will not work.
  812. \S{faq-iutf8}{Question} After I upgraded PuTTY to 0.68, I can no longer
  813. connect to my embedded device or appliance.
  814. If your SSH server has started unexpectedly closing SSH connections
  815. after you enter your password, and it worked before 0.68, you may have
  816. a buggy server that objects to certain SSH protocol extensions.
  817. The SSH protocol recently gained a new \q{terminal mode}, \cw{IUTF8},
  818. which PuTTY sends by default; see \k{config-ttymodes}. This is the
  819. first new terminal mode since the SSH-2 protocol was defined. While
  820. servers are supposed to ignore modes they don't know about, some buggy
  821. servers will unceremoniously close the connection if they see anything
  822. they don't recognise. SSH servers in embedded devices, network
  823. appliances, and the like seem to disproportionately have this bug.
  824. If you think you have such a server, from 0.69 onwards you can disable
  825. sending of the \cw{IUTF8} mode: on the SSH / TTY panel, select
  826. \cw{IUTF8} on the list, select \q{Nothing}, and press \q{Set}. (It's
  827. not possible to disable sending this mode in 0.68.)
  828. \H{faq-secure} Security questions
  829. \S{faq-publicpc}{Question} Is it safe for me to download PuTTY and
  830. use it on a public PC?
  831. It depends on whether you trust that PC. If you don't trust the
  832. public PC, don't use PuTTY on it, and don't use any other software
  833. you plan to type passwords into either. It might be watching your
  834. keystrokes, or it might tamper with the PuTTY binary you download.
  835. There is \e{no} program safe enough that you can run it on an
  836. actively malicious PC and get away with typing passwords into it.
  837. If you do trust the PC, then it's probably OK to use PuTTY on it
  838. (but if you don't trust the network, then the PuTTY download might
  839. be tampered with, so it would be better to carry PuTTY with you on a
  840. USB stick).
  841. \S{faq-cleanup}{Question} What does PuTTY leave on a system? How can
  842. I \i{clean up} after it?
  843. PuTTY will leave some Registry entries, and a random seed file, on
  844. the PC (see \k{faq-settings}). Windows 7 and up also remember some
  845. information about recently launched sessions for the \q{jump list}
  846. feature.
  847. If you are using PuTTY on a public PC, or somebody else's PC, you
  848. might want to clean this information up when you leave. You can do
  849. that automatically, by running the command \c{putty -cleanup}. See
  850. \k{using-cleanup} in the documentation for more detail. (Note that
  851. this only removes settings for the currently logged-in user on
  852. \i{multi-user systems}.)
  853. If PuTTY was installed from the installer package, it will also
  854. appear in \q{Add/Remove Programs}. Current versions of the installer
  855. do not offer to remove the above-mentioned items, so if you want them
  856. removed you should run \c{putty -cleanup} before uninstalling.
  857. \S{faq-dsa}{Question} How come PuTTY now supports \i{DSA}, when the
  858. website used to say how insecure it was?
  859. DSA has a major weakness \e{if badly implemented}: it relies on a
  860. random number generator to far too great an extent. If the random
  861. number generator produces a number an attacker can predict, the DSA
  862. private key is exposed - meaning that the attacker can log in as you
  863. on all systems that accept that key.
  864. The PuTTY policy changed because the developers were informed of
  865. ways to implement DSA which do not suffer nearly as badly from this
  866. weakness, and indeed which don't need to rely on random numbers at
  867. all. For this reason we now believe PuTTY's DSA implementation is
  868. probably OK.
  869. The recently added elliptic-curve signature methods are also DSA-style
  870. algorithms, so they have this same weakness in principle. Our ECDSA
  871. implementation uses the same defence as DSA, while our Ed25519
  872. implementation uses the similar system (but different in details) that
  873. the Ed25519 spec mandates.
  874. \S{faq-virtuallock}{Question} Couldn't Pageant use
  875. \cw{VirtualLock()} to stop private keys being written to disk?
  876. Unfortunately not. The \cw{VirtualLock()} function in the Windows
  877. API doesn't do a proper job: it may prevent small pieces of a
  878. process's memory from being paged to disk while the process is
  879. running, but it doesn't stop the process's memory as a whole from
  880. being swapped completely out to disk when the process is long-term
  881. inactive. And Pageant spends most of its time inactive.
  882. \H{faq-admin} Administrative questions
  883. \S{faq-domain}{Question} Would you like me to register you a nicer
  884. domain name?
  885. No, thank you. Even if you can find one (most of them seem to have
  886. been registered already, by people who didn't ask whether we
  887. actually wanted it before they applied), we're happy with the PuTTY
  888. web site being exactly where it is. It's not hard to find (just type
  889. \q{putty} into \W{http://www.google.com/}{google.com} and we're the
  890. first link returned), and we don't believe the administrative hassle
  891. of moving the site would be worth the benefit.
  892. In addition, if we \e{did} want a custom domain name, we would want
  893. to run it ourselves, so we knew for certain that it would continue
  894. to point where we wanted it, and wouldn't suddenly change or do
  895. strange things. Having it registered for us by a third party who we
  896. don't even know is not the best way to achieve this.
  897. \S{faq-webhosting}{Question} Would you like free web hosting for the
  898. PuTTY web site?
  899. We already have some, thanks.
  900. \S{faq-link}{Question} Would you link to my web site from the PuTTY
  901. web site?
  902. Only if the content of your web page is of definite direct interest
  903. to PuTTY users. If your content is unrelated, or only tangentially
  904. related, to PuTTY, then the link would simply be advertising for
  905. you.
  906. One very nice effect of the Google ranking mechanism is that by and
  907. large, the most popular web sites get the highest rankings. This
  908. means that when an ordinary person does a search, the top item in
  909. the search is very likely to be a high-quality site or the site they
  910. actually wanted, rather than the site which paid the most money for
  911. its ranking.
  912. The PuTTY web site is held in high esteem by Google, for precisely
  913. this reason: lots of people have linked to it simply because they
  914. like PuTTY, without us ever having to ask anyone to link to us. We
  915. feel that it would be an abuse of this esteem to use it to boost the
  916. ranking of random advertisers' web sites. If you want your web site
  917. to have a high Google ranking, we'd prefer that you achieve this the
  918. way we did - by being good enough at what you do that people will
  919. link to you simply because they like you.
  920. In particular, we aren't interested in trading links for money (see
  921. above), and we \e{certainly} aren't interested in trading links for
  922. other links (since we have no advertising on our web site, our
  923. Google ranking is not even directly worth anything to us). If we
  924. don't want to link to you for free, then we probably won't want to
  925. link to you at all.
  926. If you have software based on PuTTY, or specifically designed to
  927. interoperate with PuTTY, or in some other way of genuine interest to
  928. PuTTY users, then we will probably be happy to add a link to you on
  929. our Links page. And if you're running a particularly valuable mirror
  930. of the PuTTY web site, we might be interested in linking to you from
  931. our Mirrors page.
  932. \S{faq-sourceforge}{Question} Why don't you move PuTTY to
  933. SourceForge?
  934. Partly, because we don't want to move the web site location (see
  935. \k{faq-domain}).
  936. Also, security reasons. PuTTY is a security product, and as such it
  937. is particularly important to guard the code and the web site against
  938. unauthorised modifications which might introduce subtle security
  939. flaws. Therefore, we prefer that the Git repository, web site and
  940. FTP site remain where they are, under the direct control of system
  941. administrators we know and trust personally, rather than being run
  942. by a large organisation full of people we've never met and which is
  943. known to have had breakins in the past.
  944. No offence to SourceForge; I think they do a wonderful job. But
  945. they're not ideal for everyone, and in particular they're not ideal
  946. for us.
  947. \S{faq-mailinglist1}{Question} Why can't I subscribe to the
  948. putty-bugs mailing list?
  949. Because you're not a member of the PuTTY core development team. The
  950. putty-bugs mailing list is not a general newsgroup-like discussion
  951. forum; it's a contact address for the core developers, and an
  952. \e{internal} mailing list for us to discuss things among ourselves.
  953. If we opened it up for everybody to subscribe to, it would turn into
  954. something more like a newsgroup and we would be completely
  955. overwhelmed by the volume of traffic. It's hard enough to keep up
  956. with the list as it is.
  957. \S{faq-mailinglist2}{Question} If putty-bugs isn't a
  958. general-subscription mailing list, what is?
  959. There isn't one, that we know of.
  960. If someone else wants to set up a mailing list or other forum for
  961. PuTTY users to help each other with common problems, that would be
  962. fine with us, though the PuTTY team would almost certainly not have the
  963. time to read it. It's probably better to use one of the established
  964. newsgroups for this purpose (see \k{feedback-other-fora}).
  965. \S{faq-donations}{Question} How can I donate to PuTTY development?
  966. Please, \e{please} don't feel you have to. PuTTY is completely free
  967. software, and not shareware. We think it's very important that
  968. \e{everybody} who wants to use PuTTY should be able to, whether they
  969. have any money or not; so the last thing we would want is for a
  970. PuTTY user to feel guilty because they haven't paid us any money. If
  971. you want to keep your money, please do keep it. We wouldn't dream of
  972. asking for any.
  973. Having said all that, if you still really \e{want} to give us money,
  974. we won't argue :-) The easiest way for us to accept donations is if
  975. you send money to \cw{<[email protected]>} using PayPal
  976. (\W{http://www.paypal.com/}\cw{www.paypal.com}). If you don't like
  977. PayPal, talk to us; we can probably arrange some alternative means.
  978. Small donations (tens of dollars or tens of euros) will probably be
  979. spent on beer or curry, which helps motivate our volunteer team to
  980. continue doing this for the world. Larger donations will be spent on
  981. something that actually helps development, if we can find anything
  982. (perhaps new hardware, or a copy of Windows XP), but if we can't
  983. find anything then we'll just distribute the money among the
  984. developers. If you want to be sure your donation is going towards
  985. something worthwhile, ask us first. If you don't like these terms,
  986. feel perfectly free not to donate. We don't mind.
  987. \S{faq-permission}{Question} Can I have permission to put PuTTY on a
  988. cover disk / distribute it with other software / etc?
  989. Yes. For most things, you need not bother asking us explicitly for
  990. permission; our licence already grants you permission.
  991. See \k{feedback-permission} for more details.
  992. \S{faq-indemnity}{Question} Can you sign an agreement indemnifying
  993. us against security problems in PuTTY?
  994. No!
  995. A vendor of physical security products (e.g. locks) might plausibly
  996. be willing to accept financial liability for a product that failed
  997. to perform as advertised and resulted in damage (e.g. valuables
  998. being stolen). The reason they can afford to do this is because they
  999. sell a \e{lot} of units, and only a small proportion of them will
  1000. fail; so they can meet their financial liability out of the income
  1001. from all the rest of their sales, and still have enough left over to
  1002. make a profit. Financial liability is intrinsically linked to
  1003. selling your product for money.
  1004. There are two reasons why PuTTY is not analogous to a physical lock
  1005. in this context. One is that software products don't exhibit random
  1006. variation: \e{if} PuTTY has a security hole (which does happen,
  1007. although we do our utmost to prevent it and to respond quickly when
  1008. it does), every copy of PuTTY will have the same hole, so it's
  1009. likely to affect all the users at the same time. So even if our
  1010. users were all paying us to use PuTTY, we wouldn't be able to
  1011. \e{simultaneously} pay every affected user compensation in excess of
  1012. the amount they had paid us in the first place. It just wouldn't
  1013. work.
  1014. The second, much more important, reason is that PuTTY users
  1015. \e{don't} pay us. The PuTTY team does not have an income; it's a
  1016. volunteer effort composed of people spending their spare time to try
  1017. to write useful software. We aren't even a company or any kind of
  1018. legally recognised organisation. We're just a bunch of people who
  1019. happen to do some stuff in our spare time.
  1020. Therefore, to ask us to assume financial liability is to ask us to
  1021. assume a risk of having to pay it out of our own \e{personal}
  1022. pockets: out of the same budget from which we buy food and clothes
  1023. and pay our rent. That's more than we're willing to give. We're
  1024. already giving a lot of our spare \e{time} to developing software
  1025. for free; if we had to pay our own \e{money} to do it as well, we'd
  1026. start to wonder why we were bothering.
  1027. Free software fundamentally does not work on the basis of financial
  1028. guarantees. Your guarantee of the software functioning correctly is
  1029. simply that you have the source code and can check it before you use
  1030. it. If you want to be sure there aren't any security holes, do a
  1031. security audit of the PuTTY code, or hire a security engineer if you
  1032. don't have the necessary skills yourself: instead of trying to
  1033. ensure you can get compensation in the event of a disaster, try to
  1034. ensure there isn't a disaster in the first place.
  1035. If you \e{really} want financial security, see if you can find a
  1036. security engineer who will take financial responsibility for the
  1037. correctness of their review. (This might be less likely to suffer
  1038. from the everything-failing-at-once problem mentioned above, because
  1039. such an engineer would probably be reviewing a lot of \e{different}
  1040. products which would tend to fail independently.) Failing that, see
  1041. if you can persuade an insurance company to insure you against
  1042. security incidents, and if the insurer demands it as a condition
  1043. then get our code reviewed by a security engineer they're happy
  1044. with.
  1045. \S{faq-permission-form}{Question} Can you sign this form granting us
  1046. permission to use/distribute PuTTY?
  1047. If your form contains any clause along the lines of \q{the
  1048. undersigned represents and warrants}, we're not going to sign it.
  1049. This is particularly true if it asks us to warrant that PuTTY is
  1050. secure; see \k{faq-indemnity} for more discussion of this. But it
  1051. doesn't really matter what we're supposed to be warranting: even if
  1052. it's something we already believe is true, such as that we don't
  1053. infringe any third-party copyright, we will not sign a document
  1054. accepting any legal or financial liability. This is simply because
  1055. the PuTTY development project has no income out of which to satisfy
  1056. that liability, or pay legal costs, should it become necessary. We
  1057. cannot afford to be sued. We are assuring you that \e{we have done
  1058. our best}; if that isn't good enough for you, tough.
  1059. The existing PuTTY licence document already gives you permission to
  1060. use or distribute PuTTY in pretty much any way which does not
  1061. involve pretending you wrote it or suing us if it goes wrong. We
  1062. think that really ought to be enough for anybody.
  1063. See also \k{faq-permission-general} for another reason why we don't
  1064. want to do this sort of thing.
  1065. \S{faq-permission-future}{Question} Can you write us a formal notice
  1066. of permission to use PuTTY?
  1067. We could, in principle, but it isn't clear what use it would be. If
  1068. you think there's a serious chance of one of the PuTTY copyright
  1069. holders suing you (which we don't!), you would presumably want a
  1070. signed notice from \e{all} of them; and we couldn't provide that
  1071. even if we wanted to, because many of the copyright holders are
  1072. people who contributed some code in the past and with whom we
  1073. subsequently lost contact. Therefore the best we would be able to do
  1074. \e{even in theory} would be to have the core development team sign
  1075. the document, which wouldn't guarantee you that some other copyright
  1076. holder might not sue.
  1077. See also \k{faq-permission-general} for another reason why we don't
  1078. want to do this sort of thing.
  1079. \S{faq-permission-general}{Question} Can you sign \e{anything} for
  1080. us?
  1081. Not unless there's an incredibly good reason.
  1082. We are generally unwilling to set a precedent that involves us
  1083. having to enter into individual agreements with PuTTY users. We
  1084. estimate that we have literally \e{millions} of users, and we
  1085. absolutely would not have time to go round signing specific
  1086. agreements with every one of them. So if you want us to sign
  1087. something specific for you, you might usefully stop to consider
  1088. whether there's anything special that distinguishes you from 999,999
  1089. other users, and therefore any reason we should be willing to sign
  1090. something for you without it setting such a precedent.
  1091. If your company policy requires you to have an individual agreement
  1092. with the supplier of any software you use, then your company policy
  1093. is simply not well suited to using popular free software, and we
  1094. urge you to consider this as a flaw in your policy.
  1095. \S{faq-permission-assurance}{Question} If you won't sign anything,
  1096. can you give us some sort of assurance that you won't make PuTTY
  1097. closed-source in future?
  1098. Yes and no.
  1099. If what you want is an assurance that some \e{current version} of
  1100. PuTTY which you've already downloaded will remain free, then you
  1101. already have that assurance: it's called the PuTTY Licence. It
  1102. grants you permission to use, distribute and copy the software to
  1103. which it applies; once we've granted that permission (which we
  1104. have), we can't just revoke it.
  1105. On the other hand, if you want an assurance that \e{future} versions
  1106. of PuTTY won't be closed-source, that's more difficult. We could in
  1107. principle sign a document stating that we would never release a
  1108. closed-source PuTTY, but that wouldn't assure you that we \e{would}
  1109. keep releasing \e{open}-source PuTTYs: we would still have the
  1110. option of ceasing to develop PuTTY at all, which would surely be
  1111. even worse for you than making it closed-source! (And we almost
  1112. certainly wouldn't \e{want} to sign a document guaranteeing that we
  1113. would actually continue to do development work on PuTTY; we
  1114. certainly wouldn't sign it for free. Documents like that are called
  1115. contracts of employment, and are generally not signed except in
  1116. return for a sizeable salary.)
  1117. If we \e{were} to stop developing PuTTY, or to decide to make all
  1118. future releases closed-source, then you would still be free to copy
  1119. the last open release in accordance with the current licence, and in
  1120. particular you could start your own fork of the project from that
  1121. release. If this happened, I confidently predict that \e{somebody}
  1122. would do that, and that some kind of a free PuTTY would continue to
  1123. be developed. There's already precedent for that sort of thing
  1124. happening in free software. We can't guarantee that somebody
  1125. \e{other than you} would do it, of course; you might have to do it
  1126. yourself. But we can assure you that there would be nothing
  1127. \e{preventing} anyone from continuing free development if we
  1128. stopped.
  1129. (Finally, we can also confidently predict that if we made PuTTY
  1130. closed-source and someone made an open-source fork, most people
  1131. would switch to the latter. Therefore, it would be pretty stupid of
  1132. us to try it.)
  1133. \S{faq-export-cert}{Question} Can you provide us with export control
  1134. information / FIPS certification for PuTTY?
  1135. Some people have asked us for an Export Control Classification Number
  1136. (ECCN) for PuTTY. We don't know whether we have one, and as a team of
  1137. free software developers based in the UK we don't have the time,
  1138. money, or effort to deal with US bureaucracy to investigate any
  1139. further. We believe that PuTTY falls under 5D002 on the US Commerce
  1140. Control List, but that shouldn't be taken as definitive. If you need
  1141. to know more you should seek professional legal advice. The same
  1142. applies to any other country's legal requirements and restrictions.
  1143. Similarly, some people have asked us for FIPS certification of the
  1144. PuTTY tools. Unless someone else is prepared to do the necessary work
  1145. and pay any costs, we can't provide this.
  1146. \S{faq-vendor}{Question} As one of our existing software vendors, can
  1147. you just fill in this questionnaire for us?
  1148. We periodically receive requests like this, from organisations which
  1149. have apparently sent out a form letter to everyone listed in their big
  1150. spreadsheet of \q{software vendors} requiring them all to answer some
  1151. long list of questions about supported OS versions, paid support
  1152. arrangements, compliance with assorted local regulations we haven't
  1153. heard of, contact phone numbers, and other such administrivia. Many of
  1154. the questions are obviously meaningless when applied to PuTTY (we
  1155. don't provide any paid support in the first place!), most of the rest
  1156. could have been answered with only a very quick look at our website,
  1157. and some we are actively unwilling to answer (we are private
  1158. individuals, why would we want to give out our home phone numbers to
  1159. large corporations?).
  1160. We don't make a habit of responding in full to these questionnaires,
  1161. because \e{we are not a software vendor}.
  1162. A software \e{vendor} is a company to which you are paying lots of
  1163. money in return for some software. They know who you are, and they
  1164. know you're paying them money; so they have an incentive to fill in
  1165. your forms and questionnaires, to research any local regulations you
  1166. cite if they don't already know about them, and generally to provide
  1167. every scrap of information you might possibly need in the most
  1168. convenient manner for you, because they want to keep being paid.
  1169. But we are a team of free software developers, and that means your
  1170. relationship with us is nothing like that at all. If you once
  1171. downloaded our software from our website, that's great and we hope you
  1172. found it useful, but it doesn't mean we have the least idea who you
  1173. are, or any incentive to do lots of unpaid work to support our
  1174. \q{relationship} with you.
  1175. It's not that we are unwilling to \e{provide information}. We put as
  1176. much of it as we can on our website for your convenience, and if you
  1177. actually need to know some fact about PuTTY which you haven't been
  1178. able to find on the website (and which is not obviously inapplicable
  1179. to free software in the first place) then please do ask us, and we'll
  1180. try to answer as best we can. But we put up the website and this FAQ
  1181. precisely so that we \e{don't} have to keep answering the same
  1182. questions over and over again, so we aren't prepared to fill in
  1183. completely generic form-letter questionnaires for people who haven't
  1184. done their best to find the answers here first.
  1185. If you work for an organisation which you think might be at risk of
  1186. making this mistake, we urge you to reorganise your list of software
  1187. suppliers so that it clearly distinguishes paid vendors who know about
  1188. you from free software developers who don't have any idea who you are.
  1189. Then, only send out these mass mailings to the former.
  1190. \S{faq-checksums}{Question} The \c{sha1sums} / \c{sha256sums} / etc
  1191. files on your download page don't match the binaries.
  1192. People report this every so often, and usually the reason turns out to
  1193. be that they've matched up the wrong checksums file with the wrong
  1194. binaries.
  1195. The PuTTY download page contains more than one version of the
  1196. software. There's a \e{latest release} version; there are the
  1197. \e{development snapshots}; and when we're in the run-up to making a
  1198. release, there are also \e{pre-release} builds of the upcoming new
  1199. version. Each one has its own collection of binaries, and its own
  1200. collection of checksums files to go with them.
  1201. So if you've downloaded the release version of the actual program, you
  1202. need the release version of the checksums too, otherwise you will see
  1203. a mismatch. Similarly, the development snapshot binaries go with the
  1204. development snapshot checksums, and so on. (We've colour-coded the
  1205. download page in an effort to reduce this confusion a bit.)
  1206. If you have double-checked that, and you still think there's a real
  1207. mismatch, then please send us a report carefully quoting everything
  1208. relevant:
  1209. \b the exact URL you got your binary from
  1210. \b the checksum of the binary after you downloaded
  1211. \b the exact URL you got your checksums file from
  1212. \b the checksum that file says the binary should have.
  1213. \H{faq-misc} Miscellaneous questions
  1214. \S{faq-openssh}{Question} Is PuTTY a port of \i{OpenSSH}, or based on
  1215. OpenSSH or OpenSSL?
  1216. No, it isn't. PuTTY is almost completely composed of code written
  1217. from scratch for PuTTY. The only code we share with OpenSSH is the
  1218. detector for SSH-1 CRC compensation attacks, written by CORE SDI
  1219. S.A; we share no code at all with OpenSSL.
  1220. \S{faq-sillyputty}{Question} Where can I buy silly putty?
  1221. You're looking at the wrong web site; the only PuTTY we know about
  1222. here is the name of a computer program.
  1223. If you want the kind of putty you can buy as an executive toy, the
  1224. PuTTY team can personally recommend Thinking Putty, which you can
  1225. buy from Crazy Aaron's Putty World, at
  1226. \W{http://www.puttyworld.com}\cw{www.puttyworld.com}.
  1227. \S{faq-meaning}{Question} What does \q{PuTTY} mean?
  1228. It's the name of a popular SSH and Telnet client. Any other meaning
  1229. is in the eye of the beholder. It's been rumoured that \q{PuTTY}
  1230. is the antonym of \q{\cw{getty}}, or that it's the stuff that makes your
  1231. Windows useful, or that it's a kind of plutonium Teletype. We
  1232. couldn't possibly comment on such allegations.
  1233. \S{faq-pronounce}{Question} How do I pronounce \q{PuTTY}?
  1234. Exactly like the English word \q{putty}, which we pronounce
  1235. /\u02C8{'}p\u028C{V}ti/.