1psftp(1) PuTTY tool suite psftp(1)
2
3
4
6 psftp - interactive SFTP (secure file transfer protocol) client
7
9 psftp [options] [user@]host
10
12 psftp is an interactive text-based client for the SSH-based SFTP (se‐
13 cure file transfer) protocol.
14
16 The command-line options supported by psftp are:
17
18 -V Show version information and exit.
19
20 -pgpfp Display the fingerprints of the PuTTY PGP Master Keys and exit,
21 to aid in verifying new files released by the PuTTY team.
22
23 -b batchfile
24 Use specified batchfile.
25
26 -bc Output batchfile commands.
27
28 -be Don't stop batchfile processing on errors.
29
30 -v Show verbose messages.
31
32 -load session
33 Load settings from saved session.
34
35 -P port
36 Connect to port port.
37
38 -proxycmd command
39 Instead of making a TCP connection, use command as a proxy; net‐
40 work traffic will be redirected to the standard input and output
41 of command. command must be a single word, so is likely to need
42 quoting by the shell.
43
44 The special strings %host and %port in command will be replaced
45 by the hostname and port number you want to connect to; to get a
46 literal % sign, enter %%.
47
48 Backslash escapes are also supported, such as sequences like \n
49 being replaced by a literal newline; to get a literal backslash,
50 enter \\. (Further escaping may be required by the shell.)
51
52 (See the main PuTTY manual for full details of the supported %-
53 and backslash-delimited tokens, although most of them are proba‐
54 bly not very useful in this context.)
55
56 -l user
57 Set remote username to user.
58
59 -batch Disable interactive prompts.
60
61 -no-sanitise-stderr
62 By default, PSFTP will filter control characters from the stan‐
63 dard error channel from the server, to prevent remote processes
64 sending confusing escape sequences. This option forces the stan‐
65 dard error channel to not be filtered.
66
67 -pwfile filename
68 Open the specified file, and use the first line of text read
69 from it as the remote password.
70
71 -pw password
72 Set remote password to password. CAUTION: this will likely make
73 the password visible to other users of the local machine (via
74 commands such as `ps' or `w'). Use -pwfile instead.
75
76 -1 Force use of SSH protocol version 1.
77
78 -2 Force use of SSH protocol version 2.
79
80 -ssh-connection
81 Force use of the `bare ssh-connection' protocol. This is only
82 likely to be useful when connecting to a psusan(1) server, most
83 likely with an absolute path to a Unix-domain socket in place of
84 host.
85
86 -ssh Force use of the SSH protocol. (This is usually not needed; it's
87 only likely to be useful if you need to override some other con‐
88 figuration of the `bare ssh-connection' protocol.)
89
90 -4, -6 Force use of IPv4 or IPv6 for network connections.
91
92 -C Enable SSH compression.
93
94 -i keyfile
95 Private key file for user authentication. For SSH-2 keys, this
96 key file must be in PuTTY's PPK format, not OpenSSH's format or
97 anyone else's.
98
99 If you are using an authentication agent, you can also specify a
100 public key here (in RFC 4716 or OpenSSH format), to identify
101 which of the agent's keys to use.
102
103 -noagent
104 Don't try to use an authentication agent.
105
106 -agent Allow use of an authentication agent. (This option is only nec‐
107 essary to override a setting in a saved session.)
108
109 -no-trivial-auth
110 Disconnect from any SSH server which accepts authentication
111 without ever having asked for any kind of password or signature
112 or token. (You might want to enable this for a server you always
113 expect to challenge you, for instance to ensure you don't acci‐
114 dentally type your key file's passphrase into a compromised
115 server spoofing PSFTP's passphrase prompt.)
116
117 -hostkey key
118 Specify an acceptable host public key. This option may be speci‐
119 fied multiple times; each key can be either a fingerprint
120 (SHA256:AbCdE..., 99:aa:bb:..., etc) or a base64-encoded blob in
121 OpenSSH's one-line format.
122
123 Specifying this option overrides automated host key management;
124 only the key(s) specified on the command-line will be accepted
125 (unless a saved session also overrides host keys, in which case
126 those will be added to), and the host key cache will not be
127 written.
128
129 -sshlog logfile
130
131
132 -sshrawlog logfile
133 These options make psftp log protocol details to a file. (Some
134 of these may be sensitive, although by default an effort is made
135 to suppress obvious passwords.)
136
137 -sshlog logs decoded SSH packets and other events (those that -v
138 would print). -sshrawlog additionally logs the raw encrypted
139 packet data.
140
141 -logoverwrite
142 If PSFTP is configured to write to a log file that already ex‐
143 ists, discard the existing file.
144
145 -logappend
146 If PSFTP is configured to write to a log file that already ex‐
147 ists, append new log data to the existing file.
148
150 For a list of commands available inside psftp, type help at the psftp>
151 prompt.
152
154 For more information on psftp it's probably best to go and look at the
155 manual on the PuTTY web page:
156
157 https://www.chiark.greenend.org.uk/~sgtatham/putty/
158
160 This man page isn't terribly complete. See the above web link for bet‐
161 ter documentation.
162
163
164
165PuTTY tool suite 2004‐03‐24 psftp(1)