1pscp(1) PuTTY tool suite pscp(1)
2
3
4
6 pscp - command-line SCP (secure copy) / SFTP client
7
9 pscp [options] [user@]host:source target
10 pscp [options] source [source...] [user@]host:target
11 pscp [options] -ls [user@]host:filespec
12
14 pscp is a command-line client for the SSH-based SCP (secure copy) and
15 SFTP (secure file transfer protocol) protocols.
16
18 The command-line options supported by pscp are:
19
20 -V Show version information and exit.
21
22 -pgpfp Display the fingerprints of the PuTTY PGP Master Keys and exit,
23 to aid in verifying new files released by the PuTTY team.
24
25 -ls Remote directory listing.
26
27 -p Preserve file attributes.
28
29 -q Quiet, don't show statistics.
30
31 -r Copy directories recursively.
32
33 -unsafe
34 Allow server-side wildcards (DANGEROUS).
35
36 -v Show verbose messages.
37
38 -load session
39 Load settings from saved session.
40
41 -P port
42 Connect to port port.
43
44 -proxycmd command
45 Instead of making a TCP connection, use command as a proxy; net‐
46 work traffic will be redirected to the standard input and output
47 of command. command must be a single word, so is likely to need
48 quoting by the shell.
49
50 The special strings %host and %port in command will be replaced
51 by the hostname and port number you want to connect to; to get a
52 literal % sign, enter %%.
53
54 Backslash escapes are also supported, such as sequences like \n
55 being replaced by a literal newline; to get a literal backslash,
56 enter \\. (Further escaping may be required by the shell.)
57
58 (See the main PuTTY manual for full details of the supported %-
59 and backslash-delimited tokens, although most of them are proba‐
60 bly not very useful in this context.)
61
62 -l user
63 Set remote username to user.
64
65 -batch Disable interactive prompts.
66
67 -no-sanitise-stderr
68 By default, PSCP will filter control characters from the stan‐
69 dard error channel from the server, to prevent remote processes
70 sending confusing escape sequences. This option forces the stan‐
71 dard error channel to not be filtered.
72
73 -pw password
74 Set remote password to password. CAUTION: this will likely make
75 the password visible to other users of the local machine (via
76 commands such as `w').
77
78 -1 Force use of SSH protocol version 1.
79
80 -2 Force use of SSH protocol version 2.
81
82 -ssh-connection
83 Force use of the `bare ssh-connection' protocol. This is only
84 likely to be useful when connecting to a psusan(1) server, most
85 likely with an absolute path to a Unix-domain socket in place of
86 host.
87
88 -ssh Force use of the SSH protocol. (This is usually not needed; it's
89 only likely to be useful if you need to override some other con‐
90 figuration of the `bare ssh-connection' protocol.)
91
92 -4, -6 Force use of IPv4 or IPv6 for network connections.
93
94 -C Enable SSH compression.
95
96 -i keyfile
97 Private key file for user authentication. For SSH-2 keys, this
98 key file must be in PuTTY's PPK format, not OpenSSH's format or
99 anyone else's.
100
101 If you are using an authentication agent, you can also specify a
102 public key here (in RFC 4716 or OpenSSH format), to identify
103 which of the agent's keys to use.
104
105 -noagent
106 Don't try to use an authentication agent.
107
108 -agent Allow use of an authentication agent. (This option is only nec‐
109 essary to override a setting in a saved session.)
110
111 -hostkey key
112 Specify an acceptable host public key. This option may be speci‐
113 fied multiple times; each key can be either a fingerprint
114 (SHA256:AbCdE..., 99:aa:bb:..., etc) or a base64-encoded blob in
115 OpenSSH's one-line format.
116
117 Specifying this option overrides automated host key management;
118 only the key(s) specified on the command-line will be accepted
119 (unless a saved session also overrides host keys, in which case
120 those will be added to), and the host key cache will not be
121 written.
122
123 -scp Force use of SCP protocol.
124
125 -sftp Force use of SFTP protocol.
126
127 -sshlog logfile
128
129
130 -sshrawlog logfile
131 These options make pscp log protocol details to a file. (Some of
132 these may be sensitive, although by default an effort is made to
133 suppress obvious passwords.)
134
135 -sshlog logs decoded SSH packets and other events (those that -v
136 would print). -sshrawlog additionally logs the raw encrypted
137 packet data.
138
139 -logoverwrite
140 If PSCP is configured to write to a log file that already ex‐
141 ists, discard the existing file.
142
143 -logappend
144 If PSCP is configured to write to a log file that already ex‐
145 ists, append new log data to the existing file.
146
148 For more information on pscp it's probably best to go and look at the
149 manual on the PuTTY web page:
150
151 https://www.chiark.greenend.org.uk/~sgtatham/putty/
152
154 This man page isn't terribly complete. See the above web link for bet‐
155 ter documentation.
156
157
158
159PuTTY tool suite 2004‐03‐24 pscp(1)