1pscp(1)                        PuTTY tool suite                        pscp(1)
2
3
4

NAME

6       pscp - command-line SCP (secure copy) / SFTP client
7

SYNOPSIS

9       pscp [options] [user@]host:source target
10       pscp [options] source [source...] [user@]host:target
11       pscp [options] -ls [user@]host:filespec
12

DESCRIPTION

14       pscp  is  a command-line client for the SSH-based SCP (secure copy) and
15       SFTP (secure file transfer protocol) protocols.
16

OPTIONS

18       The command-line options supported by pscp are:
19
20       -V     Show version information and exit.
21
22       -pgpfp Display the fingerprints of the PuTTY PGP Master Keys and  exit,
23              to aid in verifying new files released by the PuTTY team.
24
25       -ls    Remote directory listing.
26
27       -p     Preserve file attributes.
28
29       -q     Quiet, don't show statistics.
30
31       -r     Copy directories recursively.
32
33       -unsafe
34              Allow server-side wildcards (DANGEROUS).
35
36       -v     Show verbose messages.
37
38       -load session
39              Load settings from saved session.
40
41       -P port
42              Connect to port port.
43
44       -proxycmd command
45              Instead of making a TCP connection, use command as a proxy; net‐
46              work traffic will be redirected to the standard input and output
47              of  command. command must be a single word, so is likely to need
48              quoting by the shell.
49
50              The special strings %host and %port in command will be  replaced
51              by the hostname and port number you want to connect to; to get a
52              literal % sign, enter %%.
53
54              Backslash escapes are also supported, such as sequences like  \n
55              being replaced by a literal newline; to get a literal backslash,
56              enter \\. (Further escaping may be required by the shell.)
57
58              (See the main PuTTY manual for full details of the supported  %-
59              and backslash-delimited tokens, although most of them are proba‐
60              bly not very useful in this context.)
61
62       -l user
63              Set remote username to user.
64
65       -batch Disable interactive prompts.
66
67       -no-sanitise-stderr
68              By default, PSCP will filter control characters from  the  stan‐
69              dard  error channel from the server, to prevent remote processes
70              sending confusing escape sequences. This option forces the stan‐
71              dard error channel to not be filtered.
72
73       -pwfile filename
74              Open  the  specified  file,  and use the first line of text read
75              from it as the remote password.
76
77       -pw password
78              Set remote password to password. CAUTION: this will likely  make
79              the  password  visible  to other users of the local machine (via
80              commands such as `ps' or `w'). Use -pwfile instead.
81
82       -1     Force use of SSH protocol version 1.
83
84       -2     Force use of SSH protocol version 2.
85
86       -ssh-connection
87              Force use of the `bare ssh-connection' protocol.  This  is  only
88              likely  to be useful when connecting to a psusan(1) server, most
89              likely with an absolute path to a Unix-domain socket in place of
90              host.
91
92       -ssh   Force use of the SSH protocol. (This is usually not needed; it's
93              only likely to be useful if you need to override some other con‐
94              figuration of the `bare ssh-connection' protocol.)
95
96       -4, -6 Force use of IPv4 or IPv6 for network connections.
97
98       -C     Enable SSH compression.
99
100       -i keyfile
101              Private  key  file for user authentication. For SSH-2 keys, this
102              key file must be in PuTTY's PPK format, not OpenSSH's format  or
103              anyone else's.
104
105              If you are using an authentication agent, you can also specify a
106              public key here (in RFC 4716 or  OpenSSH  format),  to  identify
107              which of the agent's keys to use.
108
109       -noagent
110              Don't try to use an authentication agent.
111
112       -agent Allow  use of an authentication agent. (This option is only nec‐
113              essary to override a setting in a saved session.)
114
115       -no-trivial-auth
116              Disconnect from any  SSH  server  which  accepts  authentication
117              without  ever having asked for any kind of password or signature
118              or token. (You might want to enable this for a server you always
119              expect  to challenge you, for instance to ensure you don't acci‐
120              dentally type your key  file's  passphrase  into  a  compromised
121              server spoofing PSCP's passphrase prompt.)
122
123       -hostkey key
124              Specify an acceptable host public key. This option may be speci‐
125              fied multiple times;  each  key  can  be  either  a  fingerprint
126              (SHA256:AbCdE..., 99:aa:bb:..., etc) or a base64-encoded blob in
127              OpenSSH's one-line format.
128
129              Specifying this option overrides automated host key  management;
130              only  the  key(s) specified on the command-line will be accepted
131              (unless a saved session also overrides host keys, in which  case
132              those  will  be  added  to),  and the host key cache will not be
133              written.
134
135       -scp   Force use of SCP protocol.
136
137       -sftp  Force use of SFTP protocol.
138
139       -sshlog logfile
140
141
142       -sshrawlog logfile
143              These options make pscp log protocol details to a file. (Some of
144              these may be sensitive, although by default an effort is made to
145              suppress obvious passwords.)
146
147              -sshlog logs decoded SSH packets and other events (those that -v
148              would  print).  -sshrawlog  additionally  logs the raw encrypted
149              packet data.
150
151       -logoverwrite
152              If PSCP is configured to write to a log file  that  already  ex‐
153              ists, discard the existing file.
154
155       -logappend
156              If  PSCP  is  configured to write to a log file that already ex‐
157              ists, append new log data to the existing file.
158

MORE INFORMATION

160       For more information on pscp it's probably best to go and look  at  the
161       manual on the PuTTY web page:
162
163       https://www.chiark.greenend.org.uk/~sgtatham/putty/
164

BUGS

166       This  man page isn't terribly complete. See the above web link for bet‐
167       ter documentation.
168
169
170
171PuTTY tool suite                  2004‐03‐24                           pscp(1)
Impressum