1pscp(1) PuTTY tool suite pscp(1)
2
3
4
6 pscp - command-line SCP (secure copy) / SFTP client
7
9 pscp [options] [user@]host:source target
10 pscp [options] source [source...] [user@]host:target
11 pscp [options] -ls [user@]host:filespec
12
14 pscp is a command-line client for the SSH-based SCP (secure copy) and
15 SFTP (secure file transfer protocol) protocols.
16
18 The command-line options supported by pscp are:
19
20 -V Show version information and exit.
21
22 -pgpfp Display the fingerprints of the PuTTY PGP Master Keys and exit,
23 to aid in verifying new files released by the PuTTY team.
24
25 -ls Remote directory listing.
26
27 -p Preserve file attributes.
28
29 -q Quiet, don't show statistics.
30
31 -r Copy directories recursively.
32
33 -unsafe
34 Allow server-side wildcards (DANGEROUS).
35
36 -v Show verbose messages.
37
38 -load session
39 Load settings from saved session.
40
41 -P port
42 Connect to port port.
43
44 -proxycmd command
45 Instead of making a TCP connection, use command as a proxy; net‐
46 work traffic will be redirected to the standard input and output
47 of command. command must be a single word, so is likely to need
48 quoting by the shell.
49
50 The special strings %host and %port in command will be replaced
51 by the hostname and port number you want to connect to; to get a
52 literal % sign, enter %%.
53
54 Backslash escapes are also supported, such as sequences like \n
55 being replaced by a literal newline; to get a literal backslash,
56 enter \\. (Further escaping may be required by the shell.)
57
58 (See the main PuTTY manual for full details of the supported %-
59 and backslash-delimited tokens, although most of them are proba‐
60 bly not very useful in this context.)
61
62 -l user
63 Set remote username to user.
64
65 -batch Disable interactive prompts.
66
67 -no-sanitise-stderr
68 By default, PSCP will filter control characters from the stan‐
69 dard error channel from the server, to prevent remote processes
70 sending confusing escape sequences. This option forces the stan‐
71 dard error channel to not be filtered.
72
73 -pw password
74 Set remote password to password. CAUTION: this will likely make
75 the password visible to other users of the local machine (via
76 commands such as `w').
77
78 -1 Force use of SSH protocol version 1.
79
80 -2 Force use of SSH protocol version 2.
81
82 -ssh-connection
83 Force use of the `bare ssh-connection' protocol. This is only
84 likely to be useful when connecting to a psusan(1) server, most
85 likely with an absolute path to a Unix-domain socket in place of
86 host.
87
88 -ssh Force use of the SSH protocol. (This is usually not needed; it's
89 only likely to be useful if you need to override some other con‐
90 figuration of the `bare ssh-connection' protocol.)
91
92 -4, -6 Force use of IPv4 or IPv6 for network connections.
93
94 -C Enable SSH compression.
95
96 -i keyfile
97 Private key file for user authentication. For SSH-2 keys, this
98 key file must be in PuTTY's PPK format, not OpenSSH's format or
99 anyone else's.
100
101 If you are using an authentication agent, you can also specify a
102 public key here (in RFC 4716 or OpenSSH format), to identify
103 which of the agent's keys to use.
104
105 -noagent
106 Don't try to use an authentication agent.
107
108 -agent Allow use of an authentication agent. (This option is only nec‐
109 essary to override a setting in a saved session.)
110
111 -no-trivial-auth
112 Disconnect from any SSH server which accepts authentication
113 without ever having asked for any kind of password or signature
114 or token. (You might want to enable this for a server you always
115 expect to challenge you, for instance to ensure you don't acci‐
116 dentally type your key file's passphrase into a compromised
117 server spoofing PSCP's passphrase prompt.)
118
119 -hostkey key
120 Specify an acceptable host public key. This option may be speci‐
121 fied multiple times; each key can be either a fingerprint
122 (SHA256:AbCdE..., 99:aa:bb:..., etc) or a base64-encoded blob in
123 OpenSSH's one-line format.
124
125 Specifying this option overrides automated host key management;
126 only the key(s) specified on the command-line will be accepted
127 (unless a saved session also overrides host keys, in which case
128 those will be added to), and the host key cache will not be
129 written.
130
131 -scp Force use of SCP protocol.
132
133 -sftp Force use of SFTP protocol.
134
135 -sshlog logfile
136
137
138 -sshrawlog logfile
139 These options make pscp log protocol details to a file. (Some of
140 these may be sensitive, although by default an effort is made to
141 suppress obvious passwords.)
142
143 -sshlog logs decoded SSH packets and other events (those that -v
144 would print). -sshrawlog additionally logs the raw encrypted
145 packet data.
146
147 -logoverwrite
148 If PSCP is configured to write to a log file that already ex‐
149 ists, discard the existing file.
150
151 -logappend
152 If PSCP is configured to write to a log file that already ex‐
153 ists, append new log data to the existing file.
154
156 For more information on pscp it's probably best to go and look at the
157 manual on the PuTTY web page:
158
159 https://www.chiark.greenend.org.uk/~sgtatham/putty/
160
162 This man page isn't terribly complete. See the above web link for bet‐
163 ter documentation.
164
165
166
167PuTTY tool suite 2004‐03‐24 pscp(1)