1pscp(1)                        PuTTY tool suite                        pscp(1)
2
3
4

NAME

6       pscp - command-line SCP (secure copy) / SFTP client
7

SYNOPSIS

9       pscp [options] [user@]host:source target
10       pscp [options] source [source...] [user@]host:target
11       pscp [options] -ls [user@]host:filespec
12

DESCRIPTION

14       pscp  is  a command-line client for the SSH-based SCP (secure copy) and
15       SFTP (secure file transfer protocol) protocols.
16

OPTIONS

18       The command-line options supported by pscp are:
19
20       -V     Show version information and exit.
21
22       -pgpfp Display the fingerprints of the PuTTY PGP Master Keys and  exit,
23              to aid in verifying new files released by the PuTTY team.
24
25       -ls    Remote directory listing.
26
27       -p     Preserve file attributes.
28
29       -q     Quiet, don't show statistics.
30
31       -r     Copy directories recursively.
32
33       -unsafe
34              Allow server-side wildcards (DANGEROUS).
35
36       -v     Show verbose messages.
37
38       -load session
39              Load settings from saved session.
40
41       -P port
42              Connect to port port.
43
44       -proxycmd command
45              Instead of making a TCP connection, use command as a proxy; net‐
46              work traffic will be redirected to the standard input and output
47              of  command. command must be a single word, so is likely to need
48              quoting by the shell.
49
50              The special strings %host and %port in command will be  replaced
51              by the hostname and port number you want to connect to; to get a
52              literal % sign, enter %%.
53
54              Backslash escapes are also supported, such as sequences like  \n
55              being replaced by a literal newline; to get a literal backslash,
56              enter \\. (Further escaping may be required by the shell.)
57
58              (See the main PuTTY manual for full details of the supported  %-
59              and backslash-delimited tokens, although most of them are proba‐
60              bly not very useful in this context.)
61
62       -l user
63              Set remote username to user.
64
65       -batch Disable interactive prompts.
66
67       -no-sanitise-stderr
68              By default, PSCP will filter control characters from  the  stan‐
69              dard  error channel from the server, to prevent remote processes
70              sending confusing escape sequences. This option forces the stan‐
71              dard error channel to not be filtered.
72
73       -pw password
74              Set  remote password to password. CAUTION: this will likely make
75              the password visible to other users of the  local  machine  (via
76              commands such as `w').
77
78       -1     Force use of SSH protocol version 1.
79
80       -2     Force use of SSH protocol version 2.
81
82       -ssh-connection
83              Force  use  of  the `bare ssh-connection' protocol. This is only
84              likely to be useful when connecting to a psusan(1) server,  most
85              likely with an absolute path to a Unix-domain socket in place of
86              host.
87
88       -ssh   Force use of the SSH protocol. (This is usually not needed; it's
89              only likely to be useful if you need to override some other con‐
90              figuration of the `bare ssh-connection' protocol.)
91
92       -4, -6 Force use of IPv4 or IPv6 for network connections.
93
94       -C     Enable SSH compression.
95
96       -i keyfile
97              Private key file for user authentication. For SSH-2  keys,  this
98              key  file must be in PuTTY's PPK format, not OpenSSH's format or
99              anyone else's.
100
101              If you are using an authentication agent, you can also specify a
102              public  key  here  (in  RFC 4716 or OpenSSH format), to identify
103              which of the agent's keys to use.
104
105       -noagent
106              Don't try to use an authentication agent.
107
108       -agent Allow use of an authentication agent. (This option is only  nec‐
109              essary to override a setting in a saved session.)
110
111       -no-trivial-auth
112              Disconnect  from  any  SSH  server  which accepts authentication
113              without ever having asked for any kind of password or  signature
114              or token. (You might want to enable this for a server you always
115              expect to challenge you, for instance to ensure you don't  acci‐
116              dentally  type  your  key  file's  passphrase into a compromised
117              server spoofing PSCP's passphrase prompt.)
118
119       -hostkey key
120              Specify an acceptable host public key. This option may be speci‐
121              fied  multiple  times;  each  key  can  be  either a fingerprint
122              (SHA256:AbCdE..., 99:aa:bb:..., etc) or a base64-encoded blob in
123              OpenSSH's one-line format.
124
125              Specifying  this option overrides automated host key management;
126              only the key(s) specified on the command-line will  be  accepted
127              (unless  a saved session also overrides host keys, in which case
128              those will be added to), and the host  key  cache  will  not  be
129              written.
130
131       -scp   Force use of SCP protocol.
132
133       -sftp  Force use of SFTP protocol.
134
135       -sshlog logfile
136
137
138       -sshrawlog logfile
139              These options make pscp log protocol details to a file. (Some of
140              these may be sensitive, although by default an effort is made to
141              suppress obvious passwords.)
142
143              -sshlog logs decoded SSH packets and other events (those that -v
144              would print). -sshrawlog additionally  logs  the  raw  encrypted
145              packet data.
146
147       -logoverwrite
148              If  PSCP  is  configured to write to a log file that already ex‐
149              ists, discard the existing file.
150
151       -logappend
152              If PSCP is configured to write to a log file  that  already  ex‐
153              ists, append new log data to the existing file.
154

MORE INFORMATION

156       For  more  information on pscp it's probably best to go and look at the
157       manual on the PuTTY web page:
158
159       https://www.chiark.greenend.org.uk/~sgtatham/putty/
160

BUGS

162       This man page isn't terribly complete. See the above web link for  bet‐
163       ter documentation.
164
165
166
167PuTTY tool suite                  2004‐03‐24                           pscp(1)
Impressum