man-pl.but 5.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218
  1. \cfg{man-identity}{plink}{1}{2004-03-24}{PuTTY tool suite}{PuTTY tool suite}
  2. \H{plink-manpage} Man page for Plink
  3. \S{plink-manpage-name} NAME
  4. \cw{plink} \- PuTTY link, command line network connection tool
  5. \S{plink-manpage-synopsis} SYNOPSIS
  6. \c plink [options] [user@]host [command]
  7. \e bbbbb iiiiiii iiiib iiii iiiiiii
  8. \S{plink-manpage-description} DESCRIPTION
  9. \cw{plink} is a network connection tool supporting several protocols.
  10. \S{plink-manpage-options} OPTIONS
  11. The command-line options supported by \cw{plink} are:
  12. \dt \cw{-V}
  13. \dd Show version information and exit.
  14. \dt \cw{-pgpfp}
  15. \dd Display the fingerprints of the PuTTY PGP Master Keys and exit,
  16. to aid in verifying new files released by the PuTTY team.
  17. \dt \cw{-v}
  18. \dd Show verbose messages.
  19. \dt \cw{-load} \e{session}
  20. \dd Load settings from saved session.
  21. \dt \cw{-ssh}
  22. \dd Force use of SSH protocol (default).
  23. \dt \cw{-telnet}
  24. \dd Force use of Telnet protocol.
  25. \dt \cw{-rlogin}
  26. \dd Force use of rlogin protocol.
  27. \dt \cw{-raw}
  28. \dd Force raw mode.
  29. \dt \cw{-serial}
  30. \dd Force serial mode.
  31. \dt \cw{-P} \e{port}
  32. \dd Connect to port \e{port}.
  33. \dt \cw{-l} \e{user}
  34. \dd Set remote username to \e{user}.
  35. \dt \cw{-m} \e{path}
  36. \dd Read remote command(s) from local file \e{path}.
  37. \dt \cw{-batch}
  38. \dd Disable interactive prompts.
  39. \dt \cw{-pw} \e{password}
  40. \dd Set remote password to \e{password}. \e{CAUTION:} this will likely
  41. make the password visible to other users of the local machine (via
  42. commands such as \q{\c{w}}).
  43. \dt \cw{\-L} \cw{[}\e{srcaddr}\cw{:]}\e{srcport}\cw{:}\e{desthost}\cw{:}\e{destport}
  44. \dd Set up a local port forwarding: listen on \e{srcport} (or
  45. \e{srcaddr}:\e{srcport} if specified), and forward any connections
  46. over the SSH connection to the destination address
  47. \e{desthost}:\e{destport}. Only works in SSH.
  48. \dt \cw{\-R} \cw{[}\e{srcaddr}\cw{:]}\e{srcport}\cw{:}\e{desthost}\cw{:}\e{destport}
  49. \dd Set up a remote port forwarding: ask the SSH server to listen on
  50. \e{srcport} (or \e{srcaddr}:\e{srcport} if specified), and to
  51. forward any connections back over the SSH connection where the
  52. client will pass them on to the destination address
  53. \e{desthost}:\e{destport}. Only works in SSH.
  54. \dt \cw{\-D} [\e{srcaddr}:]\e{srcport}
  55. \dd Set up dynamic port forwarding. The client listens on
  56. \e{srcport} (or \e{srcaddr}:\e{srcport} if specified), and
  57. implements a SOCKS server. So you can point SOCKS-aware applications
  58. at this port and they will automatically use the SSH connection to
  59. tunnel all their connections. Only works in SSH.
  60. \dt \cw{-X}
  61. \dd Enable X11 forwarding.
  62. \dt \cw{-x}
  63. \dd Disable X11 forwarding (default).
  64. \dt \cw{-A}
  65. \dd Enable agent forwarding.
  66. \dt \cw{-a}
  67. \dd Disable agent forwarding (default).
  68. \dt \cw{-t}
  69. \dd Enable pty allocation (default if a command is NOT specified).
  70. \dt \cw{-T}
  71. \dd Disable pty allocation (default if a command is specified).
  72. \dt \cw{-1}
  73. \dd Force use of SSH protocol version 1.
  74. \dt \cw{-2}
  75. \dd Force use of SSH protocol version 2.
  76. \dt \cw{-C}
  77. \dd Enable SSH compression.
  78. \dt \cw{-i} \e{keyfile}
  79. \dd Private key file for user authentication. For SSH-2 keys, this key
  80. file must be in PuTTY's PPK format, not OpenSSH's format or anyone
  81. else's.
  82. \lcont{ If you are using an authentication agent, you can also specify
  83. a \e{public} key here (in RFC 4716 or OpenSSH format), to identify
  84. which of the agent's keys to use. }
  85. \dt \cw{\-hostkey} \e{key}
  86. \dd Specify an acceptable host public key. This option may be specified
  87. multiple times; each key can be either a fingerprint (\cw{99:aa:bb:...}) or
  88. a base64-encoded blob in OpenSSH's one-line format.
  89. \lcont{ Specifying this option overrides automated host key
  90. management; \e{only} the key(s) specified on the command-line will be
  91. accepted (unless a saved session also overrides host keys, in which
  92. case those will be added to), and the host key cache will not be
  93. written. }
  94. \dt \cw{-s}
  95. \dd Remote command is SSH subsystem (SSH-2 only).
  96. \dt \cw{-N}
  97. \dd Don't start a remote command or shell at all (SSH-2 only).
  98. \dt \cw{\-sercfg} \e{configuration-string}
  99. \dd Specify the configuration parameters for the serial port, in
  100. \cw{-serial} mode. \e{configuration-string} should be a
  101. comma-separated list of configuration parameters as follows:
  102. \lcont{
  103. \b Any single digit from 5 to 9 sets the number of data bits.
  104. \b \cq{1}, \cq{1.5} or \cq{2} sets the number of stop bits.
  105. \b Any other numeric string is interpreted as a baud rate.
  106. \b A single lower-case letter specifies the parity: \cq{n} for none,
  107. \cq{o} for odd, \cq{e} for even, \cq{m} for mark and \cq{s} for space.
  108. \b A single upper-case letter specifies the flow control: \cq{N} for
  109. none, \cq{X} for XON/XOFF, \cq{R} for RTS/CTS and \cq{D} for
  110. DSR/DTR.
  111. }
  112. \dt \cw{\-sshlog} \e{logfile}
  113. \dt \cw{\-sshrawlog} \e{logfile}
  114. \dd For SSH connections, these options make \cw{plink} log protocol
  115. details to a file. (Some of these may be sensitive, although by default
  116. an effort is made to suppress obvious passwords.)
  117. \lcont{
  118. \cw{\-sshlog} logs decoded SSH packets and other events (those that
  119. \cw{\-v} would print). \cw{\-sshrawlog} additionally logs the raw
  120. encrypted packet data.
  121. }
  122. \S{plink-manpage-more-information} MORE INFORMATION
  123. For more information on plink, it's probably best to go and look at
  124. the manual on the PuTTY web page:
  125. \W{http://www.chiark.greenend.org.uk/~sgtatham/putty/}\cw{http://www.chiark.greenend.org.uk/~sgtatham/putty/}
  126. \S{plink-manpage-bugs} BUGS
  127. This man page isn't terribly complete. See the above web link for
  128. better documentation.