1psftp(1) PuTTY tool suite psftp(1)
2
3
4
6 psftp - interactive SFTP (secure file transfer protocol) client
7
9 psftp [options] [user@]host
10
12 psftp is an interactive text-based client for the SSH-based SFTP (se‐
13 cure file transfer) protocol.
14
16 The command-line options supported by psftp are:
17
18 -V Show version information and exit.
19
20 -pgpfp Display the fingerprints of the PuTTY PGP Master Keys and exit,
21 to aid in verifying new files released by the PuTTY team.
22
23 -b batchfile
24 Use specified batchfile.
25
26 -bc Output batchfile commands.
27
28 -be Don't stop batchfile processing on errors.
29
30 -v Show verbose messages.
31
32 -load session
33 Load settings from saved session.
34
35 -P port
36 Connect to port port.
37
38 -proxycmd command
39 Instead of making a TCP connection, use command as a proxy; net‐
40 work traffic will be redirected to the standard input and output
41 of command. command must be a single word, so is likely to need
42 quoting by the shell.
43
44 The special strings %host and %port in command will be replaced
45 by the hostname and port number you want to connect to; to get a
46 literal % sign, enter %%.
47
48 Backslash escapes are also supported, such as sequences like \n
49 being replaced by a literal newline; to get a literal backslash,
50 enter \\. (Further escaping may be required by the shell.)
51
52 (See the main PuTTY manual for full details of the supported %-
53 and backslash-delimited tokens, although most of them are proba‐
54 bly not very useful in this context.)
55
56 -l user
57 Set remote username to user.
58
59 -batch Disable interactive prompts.
60
61 -no-sanitise-stderr
62 By default, PSFTP will filter control characters from the stan‐
63 dard error channel from the server, to prevent remote processes
64 sending confusing escape sequences. This option forces the stan‐
65 dard error channel to not be filtered.
66
67 -pw password
68 Set remote password to password. CAUTION: this will likely make
69 the password visible to other users of the local machine (via
70 commands such as `w').
71
72 -1 Force use of SSH protocol version 1.
73
74 -2 Force use of SSH protocol version 2.
75
76 -ssh-connection
77 Force use of the `bare ssh-connection' protocol. This is only
78 likely to be useful when connecting to a psusan(1) server, most
79 likely with an absolute path to a Unix-domain socket in place of
80 host.
81
82 -ssh Force use of the SSH protocol. (This is usually not needed; it's
83 only likely to be useful if you need to override some other con‐
84 figuration of the `bare ssh-connection' protocol.)
85
86 -4, -6 Force use of IPv4 or IPv6 for network connections.
87
88 -C Enable SSH compression.
89
90 -i keyfile
91 Private key file for user authentication. For SSH-2 keys, this
92 key file must be in PuTTY's PPK format, not OpenSSH's format or
93 anyone else's.
94
95 If you are using an authentication agent, you can also specify a
96 public key here (in RFC 4716 or OpenSSH format), to identify
97 which of the agent's keys to use.
98
99 -noagent
100 Don't try to use an authentication agent.
101
102 -agent Allow use of an authentication agent. (This option is only nec‐
103 essary to override a setting in a saved session.)
104
105 -no-trivial-auth
106 Disconnect from any SSH server which accepts authentication
107 without ever having asked for any kind of password or signature
108 or token. (You might want to enable this for a server you always
109 expect to challenge you, for instance to ensure you don't acci‐
110 dentally type your key file's passphrase into a compromised
111 server spoofing PSFTP's passphrase prompt.)
112
113 -hostkey key
114 Specify an acceptable host public key. This option may be speci‐
115 fied multiple times; each key can be either a fingerprint
116 (SHA256:AbCdE..., 99:aa:bb:..., etc) or a base64-encoded blob in
117 OpenSSH's one-line format.
118
119 Specifying this option overrides automated host key management;
120 only the key(s) specified on the command-line will be accepted
121 (unless a saved session also overrides host keys, in which case
122 those will be added to), and the host key cache will not be
123 written.
124
125 -sshlog logfile
126
127
128 -sshrawlog logfile
129 These options make psftp log protocol details to a file. (Some
130 of these may be sensitive, although by default an effort is made
131 to suppress obvious passwords.)
132
133 -sshlog logs decoded SSH packets and other events (those that -v
134 would print). -sshrawlog additionally logs the raw encrypted
135 packet data.
136
137 -logoverwrite
138 If PSFTP is configured to write to a log file that already ex‐
139 ists, discard the existing file.
140
141 -logappend
142 If PSFTP is configured to write to a log file that already ex‐
143 ists, append new log data to the existing file.
144
146 For a list of commands available inside psftp, type help at the psftp>
147 prompt.
148
150 For more information on psftp it's probably best to go and look at the
151 manual on the PuTTY web page:
152
153 https://www.chiark.greenend.org.uk/~sgtatham/putty/
154
156 This man page isn't terribly complete. See the above web link for bet‐
157 ter documentation.
158
159
160
161PuTTY tool suite 2004‐03‐24 psftp(1)