CatgirlIntelligenceAgency/run/test-data/url--670789152

6 lines
32 KiB
Plaintext
Raw Permalink Blame History

<html>
<head></head>
<body>
:Title PuTTY User Manual 1 Title page=Top 1 Chapter 1: Introduction to PuTTY 2 Chapter 1: Introduction to PuTTY=t00000000 2 Section 1.1: What are SSH, Telnet and Rlogin?=t00000001 2 Section 1.2: How do SSH, Telnet and Rlogin differ?=t00000002 1 Chapter 2: Getting started with PuTTY 2 Chapter 2: Getting started with PuTTY=t00000003 2 Section 2.1: Starting a session=t00000004 2 Section 2.2: Verifying the host key (SSH only)=t00000005 2 Section 2.3: Logging in=t00000006 2 Section 2.4: After logging in=t00000007 2 Section 2.5: Logging out=t00000008 1 Chapter 3: Using PuTTY 2 Chapter 3: Using PuTTY=t00000009 2 Section 3.1: During your session 3 Section 3.1: During your session=t00000010 3 Section 3.1.1: Copying and pasting text=t00000011 3 Section 3.1.2: Scrolling the screen back=t00000012 3 Section 3.1.3: The System menu 4 Section 3.1.3: The System menu=t00000013 4 Section 3.1.3.1: The PuTTY Event Log=t00000014 4 Section 3.1.3.2: Special commands=t00000015 4 Section 3.1.3.3: Starting new sessions=t00000016 4 Section 3.1.3.4: Changing your session settings=t00000017 4 Section 3.1.3.5: Copy All to Clipboard=t00000018 4 Section 3.1.3.6: Clearing and resetting the terminal=t00000019 4 Section 3.1.3.7: Full screen mode=t00000020 1 Section 3.2: Creating a log file of your session=t00000021 1 Section 3.3: Altering your character set configuration=t00000022 1 Section 3.4: Using X11 forwarding in SSH=t00000023 1 Section 3.5: Using port forwarding in SSH=t00000024 1 Section 3.6: Making raw TCP connections=t00000025 1 Section 3.7: Connecting to a local serial line=t00000026 2 Section 3.8: The PuTTY command line 3 Section 3.8: The PuTTY command line=t00000027 3 Section 3.8.1: Starting a session from the command line=t00000028 3 Section 3.8.2: -cleanup=options.cleanup 3 Section 3.8.3: Standard command-line options 4 Section 3.8.3: Standard command-line options=t00000029 4 Section 3.8.3.1: -load: load a saved session=t00000030 4 Section 3.8.3.2: Selecting a protocol: -ssh, -telnet, -rlogin, -raw -serial=t00000031 4 Section 3.8.3.3: -v: increase verbosity=t00000032 4 Section 3.8.3.4: -l: specify a login name=t00000033 4 Section 3.8.3.5: -L, -R and -D: set up port forwardings=t00000034 4 Section 3.8.3.6: -m: read a remote command or script from a file=t00000035 4 Section 3.8.3.7: -P: specify a port number=t00000036 4 Section 3.8.3.8: -pw: specify a password=t00000037 4 Section 3.8.3.9: -agent and -noagent: control use of Pageant for authentication=t00000038 4 Section 3.8.3.10: -A and -a: control agent forwarding=t00000039 4 Section 3.8.3.11: -X and -x: control X11 forwarding=t00000040 4 Section 3.8.3.12: -t and -T: control pseudo-terminal allocation=t00000041 4 Section 3.8.3.13: -N: suppress starting a shell or command=t00000042 4 Section 3.8.3.14: -nc: make a remote network connection in place of a remote shell or command=t00000043 4 Section 3.8.3.15: -C: enable compression=t00000044 4 Section 3.8.3.16: -1 and -2: specify an SSH protocol version=t00000045 4 Section 3.8.3.17: -4 and -6: specify an Internet protocol version=t00000046 4 Section 3.8.3.18: -i: specify an SSH private key=t00000047 4 Section 3.8.3.19: -loghost: specify a logical host name=t00000048 4 Section 3.8.3.20: -pgpfp: display PGP key fingerprints=t00000049 4 Section 3.8.3.21: -sercfg: specify serial port configuration=t00000050 1 Chapter 4: Configuring PuTTY 2 Chapter 4: Configuring PuTTY=t00000051 2 Section 4.1: The Session panel 3 Section 4.1: The Session panel=t00000052 3 Section 4.1.1: The host name section=session.hostname 3 Section 4.1.2: Loading and storing saved sessions=session.saved 3 Section 4.1.3: <20>Close Window on Exit<69>=session.coe 2 Section 4.2: The Logging panel 3 Section 4.2: The Logging panel=logging.main 3 Section 4.2.1: <20>Log file name<6D>=logging.filename 3 Section 4.2.2: <20>What to do if the log file already exists<74>=logging.exists 3 Section 4.2.3: <20>Flush log file frequently<6C>=logging.flush 3 Section 4.2.4: Options specific to SSH packet logging 4 Section 4.2.4: Options specific to SSH packet logging=t00000053 4 Section 4.2.4.1: <20>Omit known password fields<64>=logging.ssh.omitpassword 4 Section 4.2.4.2: <20>Omit session data<74>=logging.ssh.omitdata 2 Section 4.3: The Terminal panel 3 Section 4.3: The Terminal panel=t00000054 3 Section 4.3.1: <20>Auto wrap mode initially on<6F>=terminal.autowrap 3 Section 4.3.2: <20>DEC Origin Mode initially on<6F>=terminal.decom 3 Section 4.3.3: <20>Implicit CR in every LF<4C>=terminal.lfhascr 3 Section 4.3.4: <20>Implicit LF in every CR<43>=terminal.crhaslf 3 Section 4.3.5: <20>Use background colour to erase screen<65>=terminal.bce 3 Section 4.3.6: <20>Enable blinking text<78>=terminal.blink 3 Section 4.3.7: <20>Answerback to ^E<>=terminal.answerback 3 Section 4.3.8: <20>Local echo<68>=terminal.localecho 3 Section 4.3.9: <20>Local line editing<6E>=terminal.localedit 3 Section 4.3.10: Remote-controlled printing=terminal.printing 2 Section 4.4: The Keyboard panel 3 Section 4.4: The Keyboard panel=t00000055 3 Section 4.4.1: Changing the action of the Backspace key=keyboard.backspace 3 Section 4.4.2: Changing the action of the Home and End keys=keyboard.homeend 3 Section 4.4.3: Changing the action of the function keys and keypad=keyboard.funkeys 3 Section 4.4.4: Controlling Application Cursor Keys mode=keyboard.appcursor 3 Section 4.4.5: Controlling Application Keypad mode=keyboard.appkeypad 3 Section 4.4.6: Using NetHack keypad mode=keyboard.nethack 3 Section 4.4.7: Enabling a DEC-like Compose key=keyboard.compose 3 Section 4.4.8: <20>Control-Alt is different from AltGr<47>=keyboard.ctrlalt 2 Section 4.5: The Bell panel 3 Section 4.5: The Bell panel=t00000056 3 Section 4.5.1: <20>Set the style of bell<6C>=bell.style 3 Section 4.5.2: <20>Taskbar/caption indication on bell<6C>=bell.taskbar 3 Section 4.5.3: <20>Control the bell overload behaviour<75>=bell.overload 2 Section 4.6: The Features panel 3 Section 4.6: The Features panel=t00000057 3 Section 4.6.1: Disabling application keypad and cursor keys=features.application 3 Section 4.6.2: Disabling xterm-style mouse reporting=features.mouse 3 Section 4.6.3: Disabling remote terminal resizing=features.resize 3 Section 4.6.4: Disabling switching to the alternate screen=features.altscreen 3 Section 4.6.5: Disabling remote window title changing=features.retitle 3 Section 4.6.6: Response to remote window title querying=features.qtitle 3 Section 4.6.7: Disabling destructive backspace=features.dbackspace 3 Section 4.6.8: Disabling remote character set configuration=features.charset 3 Section 4.6.9: Disabling Arabic text shaping=features.arabicshaping 3 Section 4.6.10: Disabling bidirectional text display=features.bidi 2 Section 4.7: The Window panel 3 Section 4.7: The Window panel=t00000058 3 Section 4.7.1: Setting the size of the PuTTY window=window.size 3 Section 4.7.2: What to do when the window is resized=window.resize 3 Section 4.7.3: Controlling scrollback=window.scrollback 3 Section 4.7.4: <20>Push erased text into scrollback<63>=window.erased 2 Section 4.8: The Appearance panel 3 Section 4.8: The Appearance panel=t00000059 3 Section 4.8.1: Controlling the appearance of the cursor=appearance.cursor 3 Section 4.8.2: Controlling the font used in the terminal window=appearance.font 3 Section 4.8.3: <20>Hide mouse pointer when typing in window<6F>=appearance.hidemouse 3 Section 4.8.4: Controlling the window border=appearance.border 2 Section 4.9: The Behaviour panel 3 Section 4.9: The Behaviour panel=t00000060 3 Section 4.9.1: Controlling the window title=appearance.title 3 Section 4.9.2: <20>Warn before closing window<6F>=behaviour.closewarn 3 Section 4.9.3: <20>Window closes on ALT-F4<46>=behaviour.altf4 3 Section 4.9.4: <20>System menu appears on ALT-Space<63>=behaviour.altspace 3 Section 4.9.5: <20>System menu appears on Alt alone<6E>=behaviour.altonly 3 Section 4.9.6: <20>Ensure window is always on top<6F>=behaviour.alwaysontop 3 Section 4.9.7: <20>Full screen on Alt-Enter<65>=behaviour.altenter 2 Section 4.10: The Translation panel 3 Section 4.10: The Translation panel=t00000061 3 Section 4.10.1: Controlling character set translation=translation.codepage 3 Section 4.10.2: <20>Treat CJK ambiguous characters as wide<64>=translation.cjkambigwide 3 Section 4.10.3: <20>Caps Lock acts as Cyrillic switch<63>=translation.cyrillic 3 Section 4.10.4: Controlling display of line-drawing characters=translation.linedraw 3 Section 4.10.5: Controlling copy and paste of line drawing characters=selection.linedraw 2 Section 4.11: The Selection panel 3 Section 4.11: The Selection panel=t00000062 3 Section 4.11.1: Pasting in Rich Text Format=selection.rtf 3 Section 4.11.2: Changing the actions of the mouse buttons=selection.buttons 3 Section 4.11.3: <20>Shift overrides application's use of mouse<73>=selection.shiftdrag 3 Section 4.11.4: Default selection mode=selection.rect 3 Section 4.11.5: Configuring word-by-word selection=selection.charclasses 2 Section 4.12: The Colours panel 3 Section 4.12: The Colours panel=t00000063 3 Section 4.12.1: <20>Allow terminal to specify ANSI colours<72>=colours.ansi 3 Section 4.12.2: <20>Allow terminal to use xterm 256-colour mode<64>=colours.xterm256 3 Section 4.12.3: <20>Bolded text is a different colour<75>=colours.bold 3 Section 4.12.4: <20>Attempt to use logical palettes<65>=colours.logpal 3 Section 4.12.5: <20>Use system colours<72>=colours.system 3 Section 4.12.6: Adjusting the colours in the terminal window=colours.config 2 Section 4.13: The Connection panel 3 Section 4.13: The Connection panel=t00000064 3 Section 4.13.1: Using keepalives to prevent disconnection=connection.keepalive 3 Section 4.13.2: <20>Disable Nagle's algorithm<68>=connection.nodelay 3 Section 4.13.3: <20>Enable TCP keepalives<65>=connection.tcpkeepalive 3 Section 4.13.4: <20>Internet protocol<6F>=connection.ipversion 3 Section 4.13.5: <20>Logical name of remote host<73>=connection.loghost 2 Section 4.14: The Data panel 3 Section 4.14: The Data panel=t00000065 3 Section 4.14.1: <20>Auto-login username<6D>=connection.username 3 Section 4.14.2: Use of system username=connection.usernamefromenv 3 Section 4.14.3: <20>Terminal-type string<6E>=connection.termtype 3 Section 4.14.4: <20>Terminal speeds<64>=connection.termspeed 3 Section 4.14.5: Setting environment variables on the server=telnet.environ 2 Section 4.15: The Proxy panel 3 Section 4.15: The Proxy panel=proxy.main 3 Section 4.15.1: Setting the proxy type=proxy.type 3 Section 4.15.2: Excluding parts of the network from proxying=proxy.exclude 3 Section 4.15.3: Name resolution when using a proxy=proxy.dns 3 Section 4.15.4: Username and password=proxy.auth 3 Section 4.15.5: Specifying the Telnet or Local proxy command=proxy.command 2 Section 4.16: The Telnet panel 3 Section 4.16: The Telnet panel=t00000066 3 Section 4.16.1: <20>Handling of OLD_ENVIRON ambiguity<74>=telnet.oldenviron 3 Section 4.16.2: Passive and active Telnet negotiation modes=telnet.passive 3 Section 4.16.3: <20>Keyboard sends Telnet special commands<64>=telnet.specialkeys 3 Section 4.16.4: <20>Return key sends Telnet New Line instead of ^M<>=telnet.newline 2 Section 4.17: The Rlogin panel 3 Section 4.17: The Rlogin panel=t00000067 3 Section 4.17.1: <20>Local username<6D>=rlogin.localuser 2 Section 4.18: The SSH panel 3 Section 4.18: The SSH panel=t00000068 3 Section 4.18.1: Executing a specific command on the server=ssh.command 3 Section 4.18.2: <20>Don't start a shell or command at all<6C>=ssh.noshell 3 Section 4.18.3: <20>Enable compression<6F>=ssh.compress 3 Section 4.18.4: <20>Preferred SSH protocol version<6F>=ssh.protocol 3 Section 4.18.5: Encryption algorithm selection=ssh.ciphers 2 Section 4.19: The Kex panel 3 Section 4.19: The Kex panel=t00000069 3 Section 4.19.1: Key exchange algorithm selection=ssh.kex.order 3 Section 4.19.2: Repeat key exchange=ssh.kex.repeat 2 Section 4.20: The Auth panel 3 Section 4.20: The Auth panel=t00000070 3 Section 4.20.1: <20>Bypass authentication entirely<6C>=ssh.auth.bypass 3 Section 4.20.2: <20>Display pre-authentication banner<65>=ssh.auth.banner 3 Section 4.20.3: <20>Attempt authentication using Pageant<6E>=ssh.auth.pageant 3 Section 4.20.4: <20>Attempt TIS or CryptoCard authentication<6F>=ssh.auth.tis 3 Section 4.20.5: <20>Attempt keyboard-interactive authentication<6F>=ssh.auth.ki 3 Section 4.20.6: <20>Allow agent forwarding<6E>=ssh.auth.agentfwd 3 Section 4.20.7: <20>Allow attempted changes of username in SSH-2<>=ssh.auth.changeuser 3 Section 4.20.8: <20>Private key file for authentication<6F>=ssh.auth.privkey 2 Section 4.21: The GSSAPI panel 3 Section 4.21: The GSSAPI panel=ssh.auth.gssapi 3 Section 4.21.1: <20>Allow GSSAPI credential delegation<6F>=ssh.auth.gssapi.delegation 3 Section 4.21.2: Preference order for GSSAPI libraries=ssh.auth.gssapi.libraries 2 Section 4.22: The TTY panel 3 Section 4.22: The TTY panel=t00000071 3 Section 4.22.1: <20>Don't allocate a pseudo-terminal<61>=ssh.nopty 3 Section 4.22.2: Sending terminal modes=ssh.ttymodes 2 Section 4.23: The X11 panel 3 Section 4.23: The X11 panel=ssh.tunnels.x11 3 Section 4.23.1: Remote X11 authentication=ssh.tunnels.x11auth 3 Section 4.23.2: X authority file for local display=ssh.tunnels.xauthority 2 Section 4.24: The Tunnels panel 3 Section 4.24: The Tunnels panel=ssh.tunnels.portfwd 3 Section 4.24.1: Controlling the visibility of forwarded ports=ssh.tunnels.portfwd.localhost 3 Section 4.24.2: Selecting Internet protocol version for forwarded ports=ssh.tunnels.portfwd.ipversion 2 Section 4.25: The Bugs panel 3 Section 4.25: The Bugs panel=t00000072 3 Section 4.25.1: <20>Chokes on SSH-1 ignore messages<65>=ssh.bugs.ignore1 3 Section 4.25.2: <20>Refuses all SSH-1 password camouflage<67>=ssh.bugs.plainpw1 3 Section 4.25.3: <20>Chokes on SSH-1 RSA authentication<6F>=ssh.bugs.rsa1 3 Section 4.25.4: <20>Chokes on SSH-2 ignore messages<65>=ssh.bugs.ignore2 3 Section 4.25.5: <20>Miscomputes SSH-2 HMAC keys<79>=ssh.bugs.hmac2 3 Section 4.25.6: <20>Miscomputes SSH-2 encryption keys<79>=ssh.bugs.derivekey2 3 Section 4.25.7: <20>Requires padding on SSH-2 RSA signatures<65>=ssh.bugs.rsapad2 3 Section 4.25.8: <20>Misuses the session ID in SSH-2 PK auth<74>=ssh.bugs.pksessid2 3 Section 4.25.9: <20>Handles SSH-2 key re-exchange badly<6C>=ssh.bugs.rekey2 3 Section 4.25.10: <20>Ignores SSH-2 maximum packet size<7A>=ssh.bugs.maxpkt2 2 Section 4.26: The Serial panel 3 Section 4.26: The Serial panel=t00000073 3 Section 4.26.1: Selecting a serial line to connect to=serial.line 3 Section 4.26.2: Selecting the speed of your serial line=serial.speed 3 Section 4.26.3: Selecting the number of data bits=serial.databits 3 Section 4.26.4: Selecting the number of stop bits=serial.stopbits 3 Section 4.26.5: Selecting the serial parity checking scheme=serial.parity 3 Section 4.26.6: Selecting the serial flow control scheme=serial.flow 1 Section 4.27: Storing configuration in a file=t00000074 1 Chapter 5: Using PSCP to transfer files securely 2 Chapter 5: Using PSCP to transfer files securely=t00000075 2 Section 5.1: Starting PSCP=t00000076 2 Section 5.2: PSCP Usage 3 Section 5.2: PSCP Usage=t00000077 3 Section 5.2.1: The basics 4 Section 5.2.1: The basics=t00000078 4 Section 5.2.1.1: user=t00000079 4 Section 5.2.1.2: host=t00000080 4 Section 5.2.1.3: source=t00000081 4 Section 5.2.1.4: target=t00000082 3 Section 5.2.2: Options 4 Section 5.2.2: Options=t00000083 4 Section 5.2.2.1: -ls list remote files=t00000084 4 Section 5.2.2.2: -p preserve file attributes=t00000085 4 Section 5.2.2.3: -q quiet, don't show statistics=t00000086 4 Section 5.2.2.4: -r copies directories recursively=t00000087 4 Section 5.2.2.5: -batch avoid interactive prompts=t00000088 4 Section 5.2.2.6: -sftp, -scp force use of particular protocol=t00000089 2 Section 5.2.3: Return value=t00000090 2 Section 5.2.4: Using public key authentication with PSCP=t00000091 1 Chapter 6: Using PSFTP to transfer files securely 2 Chapter 6: Using PSFTP to transfer files securely=t00000092 2 Section 6.1: Starting PSFTP 3 Section 6.1: Starting PSFTP=t00000093 3 Section 6.1.1: -b: specify a file containing batch commands=t00000094 3 Section 6.1.2: -bc: display batch commands as they are run=t00000095 3 Section 6.1.3: -be: continue batch processing on errors=t00000096 3 Section 6.1.4: -batch: avoid interactive prompts=t00000097 2 Section 6.2: Running PSFTP 3 Section 6.2: Running PSFTP=t00000098 3 Section 6.2.1: General quoting rules for PSFTP commands=t00000099 3 Section 6.2.2: Wildcards in PSFTP=t00000100 3 Section 6.2.3: The open command: start a session=t00000101 3 Section 6.2.4: The quit command: end your session=t00000102 3 Section 6.2.5: The close command: close your connection=t00000103 3 Section 6.2.6: The help command: get quick online help=t00000104 3 Section 6.2.7: The cd and pwd commands: changing the remote working directory=t00000105 3 Section 6.2.8: The lcd and lpwd commands: changing the local working directory=t00000106 3 Section 6.2.9: The get command: fetch a file from the server=t00000107 3 Section 6.2.10: The put command: send a file to the server=t00000108 3 Section 6.2.11: The mget and mput commands: fetch or send multiple files=t00000109 3 Section 6.2.12: The reget and reput commands: resuming file transfers=t00000110 3 Section 6.2.13: The dir command: list remote files=t00000111 3 Section 6.2.14: The chmod command: change permissions on remote files=t00000112 3 Section 6.2.15: The del command: delete remote files=t00000113 3 Section 6.2.16: The mkdir command: create remote directories=t00000114 3 Section 6.2.17: The rmdir command: remove remote directories=t00000115 3 Section 6.2.18: The mv command: move and rename remote files=t00000116 3 Section 6.2.19: The ! command: run a local Windows command=t00000117 1 Section 6.3: Using public key authentication with PSFTP=t00000118 1 Chapter 7: Using the command-line connection tool Plink 2 Chapter 7: Using the command-line connection tool Plink=t00000119 2 Section 7.1: Starting Plink=t00000120 2 Section 7.2: Using Plink 3 Section 7.2: Using Plink=t00000121 3 Section 7.2.1: Using Plink for interactive logins=t00000122 3 Section 7.2.2: Using Plink for automated connections=t00000123 3 Section 7.2.3: Plink command line options 4 Section 7.2.3: Plink command line options=t00000124 4 Section 7.2.3.1: -batch: disable all interactive prompts=t00000125 4 Section 7.2.3.2: -s: remote command is SSH subsystem=t00000126 1 Section 7.3: Using Plink in batch files and scripts=t00000127 1 Section 7.4: Using Plink with CVS=t00000128 1 Section 7.5: Using Plink with WinCVS=t00000129 1 Chapter 8: Using public keys for SSH authentication 2 Chapter 8: Using public keys for SSH authentication=t00000130 2 Section 8.1: Public key authentication - an introduction=t00000131 2 Section 8.2: Using PuTTYgen, the PuTTY key generator 3 Section 8.2: Using PuTTYgen, the PuTTY key generator=puttygen.general 3 Section 8.2.1: Generating a new key=t00000132 3 Section 8.2.2: Selecting the type of key=puttygen.keytype 3 Section 8.2.3: Selecting the size (strength) of the key=puttygen.bits 3 Section 8.2.4: The <20>Generate<74> button=puttygen.generate 3 Section 8.2.5: The <20>Key fingerprint<6E> box=puttygen.fingerprint 3 Section 8.2.6: Setting a comment for your key=puttygen.comment 3 Section 8.2.7: Setting a passphrase for your key=puttygen.passphrase 3 Section 8.2.8: Saving your private key to a disk file=puttygen.savepriv 3 Section 8.2.9: Saving your public key to a disk file=puttygen.savepub 3 Section 8.2.10: <20>Public key for pasting into authorized_keys file<6C>=puttygen.pastekey 3 Section 8.2.11: Reloading a private key=puttygen.load 3 Section 8.2.12: Dealing with private keys in other formats=puttygen.conversions 1 Section 8.3: Getting ready for public key authentication=t00000133 1 Chapter 9: Using Pageant for authentication 2 Chapter 9: Using Pageant for authentication=pageant.general 2 Section 9.1: Getting started with Pageant=t00000134 2 Section 9.2: The Pageant main window 3 Section 9.2: The Pageant main window=t00000135 3 Section 9.2.1: The key list box=pageant.keylist 3 Section 9.2.2: The <20>Add Key<65> button=pageant.addkey 3 Section 9.2.3: The <20>Remove Key<65> button=pageant.remkey 2 Section 9.3: The Pageant command line 3 Section 9.3: The Pageant command line=t00000136 3 Section 9.3.1: Making Pageant automatically load keys on startup=t00000137 3 Section 9.3.2: Making Pageant run another program=t00000138 1 Section 9.4: Using agent forwarding=t00000139 1 Section 9.5: Security considerations=t00000140 1 Chapter 10: Common error messages 2 Chapter 10: Common error messages=t00000141 2 Section 10.1: <20>The server's host key is not cached in the registry<72>=errors.hostkey.absent 2 Section 10.2: <20>WARNING - POTENTIAL SECURITY BREACH!<21>=errors.hostkey.changed 2 Section 10.3: <20>Out of space for port forwardings<67>=t00000142 2 Section 10.4: <20>The first cipher supported by the server is ... below the configured warning threshold<6C>=t00000143 2 Section 10.5: <20>Server sent disconnect message type 2 (protocol error): "Too many authentication failures for root"<22>=t00000144 2 Section 10.6: <20>Out of memory<72>=t00000145 2 Section 10.7: <20>Internal error<6F>, <20>Internal fault<6C>, <20>Assertion failed<65>=t00000146 2 Section 10.8: <20>Unable to use this private key file<6C>, <20>Couldn't load private key<65>, <20>Key is of wrong type<70>=errors.cantloadkey 2 Section 10.9: <20>Server refused our public key<65> or <20>Key refused<65>=t00000147 2 Section 10.10: <20>Access denied<65>, <20>Authentication refused<65>=t00000148 2 Section 10.11: <20>No supported authentication methods available<6C>=t00000149 2 Section 10.12: <20>Incorrect CRC received on packet<65> or <20>Incorrect MAC received on packet<65>=t00000150 2 Section 10.13: <20>Incoming packet was garbled on decryption<6F>=t00000151 2 Section 10.14: <20>PuTTY X11 proxy: various errors<72>=t00000152 2 Section 10.15: <20>Network error: Software caused connection abort<72>=t00000153 2 Section 10.16: <20>Network error: Connection reset by peer<65>=t00000154 2 Section 10.17: <20>Network error: Connection refused<65>=t00000155 2 Section 10.18: <20>Network error: Connection timed out<75>=t00000156 1 Appendix A: PuTTY FAQ 2 Appendix A: PuTTY FAQ=t00000157 2 Section A.1: Introduction 3 Section A.1: Introduction=t00000158 3 Question A.1.1: What is PuTTY?=t00000159 2 Section A.2: Features supported in PuTTY 3 Section A.2: Features supported in PuTTY=t00000160 3 Question A.2.1: Does PuTTY support SSH-2?=t00000161 3 Question A.2.2: Does PuTTY support reading OpenSSH or ssh.com SSH-2 private key files?=t00000162 3 Question A.2.3: Does PuTTY support SSH-1?=t00000163 3 Question A.2.4: Does PuTTY support local echo?=t00000164 3 Question A.2.5: Does PuTTY support storing settings, so I don't have to change them every time?=t00000165 3 Question A.2.6: Does PuTTY support storing its settings in a disk file?=t00000166 3 Question A.2.7: Does PuTTY support full-screen mode, like a DOS box?=t00000167 3 Question A.2.8: Does PuTTY have the ability to remember my password so I don't have to type it every time?=t00000168 3 Question A.2.9: Is there an option to turn off the annoying host key prompts?=t00000169 3 Question A.2.10: Will you write an SSH server for the PuTTY suite, to go with the client?=t00000170 3 Question A.2.11: Can PSCP or PSFTP transfer files in ASCII mode?=t00000171 2 Section A.3: Ports to other operating systems 3 Section A.3: Ports to other operating systems=t00000172 3 Question A.3.1: What ports of PuTTY exist?=t00000173 3 Question A.3.2: Is there a port to Unix?=t00000174 3 Question A.3.3: What's the point of the Unix port? Unix has OpenSSH.=t00000175 3 Question A.3.4: Will there be a port to Windows CE or PocketPC?=t00000176 3 Question A.3.5: Is there a port to Windows 3.1?=t00000177 3 Question A.3.6: Will there be a port to the Mac?=t00000178 3 Question A.3.7: Will there be a port to EPOC?=t00000179 3 Question A.3.8: Will there be a port to the iPhone?=t00000180 2 Section A.4: Embedding PuTTY in other programs 3 Section A.4: Embedding PuTTY in other programs=t00000181 3 Question A.4.1: Is the SSH or Telnet code available as a DLL?=t00000182 3 Question A.4.2: Is the SSH or Telnet code available as a Visual Basic component?=t00000183 3 Question A.4.3: How can I use PuTTY to make an SSH connection from within another program?=t00000184 2 Section A.5: Details of PuTTY's operation 3 Section A.5: Details of PuTTY's operation=t00000185 3 Question A.5.1: What terminal type does PuTTY use?=t00000186 3 Question A.5.2: Where does PuTTY store its data?=t00000187 2 Section A.6: HOWTO questions 3 Section A.6: HOWTO questions=t00000188 3 Question A.6.1: What login name / password should I use?=t00000189 3 Question A.6.2: What commands can I type into my PuTTY terminal window?=t00000190 3 Question A.6.3: How can I make PuTTY start up maximised?=t00000191 3 Question A.6.4: How can I create a Windows shortcut to start a particular saved session directly?=t00000192 3 Question A.6.5: How can I start an SSH session straight from the command line?=t00000193 3 Question A.6.6: How do I copy and paste between PuTTY and other Windows applications?=t00000194 3 Question A.6.7: How do I use all PuTTY's features (public keys, proxying, cipher selection, etc.) in PSCP, PSFTP and Plink?=t00000195 3 Question A.6.8: How do I use PSCP.EXE? When I double-click it gives me a command prompt window which then closes instantly.=t00000196 3 Question A.6.9: How do I use PSCP to copy a file whose name has spaces in?=t00000197 2 Section A.7: Troubleshooting 3 Section A.7: Troubleshooting=t00000198 3 Question A.7.1: Why do I see <20>Incorrect MAC received on packet<65>?=t00000199 3 Question A.7.2: Why do I see <20>Fatal: Protocol error: Expected control record<72> in PSCP?=t00000200 3 Question A.7.3: I clicked on a colour in the Colours panel, and the colour didn't change in my terminal.=t00000201 3 Question A.7.4: Plink on Windows 95 says it can't find WS2_32.DLL.=t00000202 3 Question A.7.5: After trying to establish an SSH-2 connection, PuTTY says <20>Out of memory<72> and dies.=t00000203 3 Question A.7.6: When attempting a file transfer, either PSCP or PSFTP says <20>Out of memory<72> and dies.=t00000204 3 Question A.7.7: PSFTP transfers files much slower than PSCP.=t00000205 3 Question A.7.8: When I run full-colour applications, I see areas of black space where colour ought to be, or vice versa.=t00000206 3 Question A.7.9: When I change some terminal settings, nothing happens.=t00000207 3 Question A.7.10: My PuTTY sessions unexpectedly close after they are idle for a while.=t00000208 3 Question A.7.11: PuTTY's network connections time out too quickly when network connectivity is temporarily lost.=t00000209 3 Question A.7.12: When I cat a binary file, I get <20>PuTTYPuTTYPuTTY<54> on my command line.=t00000210 3 Question A.7.13: When I cat a binary file, my window title changes to a nonsense string.=t00000211 3 Question A.7.14: My keyboard stops working once PuTTY displays the password prompt.=t00000212 3 Question A.7.15: One or more function keys don't do what I expected in a server-side application.=t00000213 3 Question A.7.16: Since my SSH server was upgraded to OpenSSH 3.1p1/3.4p1, I can no longer connect with PuTTY.=t00000214 3 Question A.7.17: Why do I see <20>Couldn't load private key from ...<2E>? Why can PuTTYgen load my key but not PuTTY?=t00000215 3 Question A.7.18: When I'm connected to a Red Hat Linux 8.0 system, some characters don't display properly.=t00000216 3 Question A.7.19: Since I upgraded to PuTTY 0.54, the scrollback has stopped working when I run screen.=t00000217 3 Question A.7.20: Since I upgraded Windows XP to Service Pack 2, I can't use addresses like 127.0.0.2.=t00000218 3 Question A.7.21: PSFTP commands seem to be missing a directory separator (slash).=t00000219 3 Question A.7.22: Do you want to hear about <20>Software caused connection abort<72>?=t00000220 3 Question A.7.23: My SSH-2 session locks up for a few seconds every so often.=t00000221 3 Question A.7.24: PuTTY fails to start up. Windows claims that <20>the application configuration is incorrect<63>.=t00000222 2 Section A.8: Security questions 3 Section A.8: Security questions=t00000223 3 Question A.8.1: Is it safe for me to download PuTTY and use it on a public PC?=t00000224 3 Question A.8.2: What does PuTTY leave on a system? How can I clean up after it?=t00000225 3 Question A.8.3: How come PuTTY now supports DSA, when the website used to say how insecure it was?=t00000226 3 Question A.8.4: Couldn't Pageant use VirtualLock() to stop private keys being written to disk?=t00000227 2 Section A.9: Administrative questions 3 Section A.9: Administrative questions=t00000228 3 Question A.9.1: Would you like me to register you a nicer domain name?=t00000229 3 Question A.9.2: Would you like free web hosting for the PuTTY web site?=t00000230 3 Question A.9.3: Would you link to my web site from the PuTTY web site?=t00000231 3 Question A.9.4: Why don't you move PuTTY to SourceForge?=t00000232 3 Question A.9.5: Why can't I subscribe to the putty-bugs mailing list?=t00000233 3 Question A.9.6: If putty-bugs isn't a general-subscription mailing list, what is?=t00000234 3 Question A.9.7: How can I donate to PuTTY development?=t00000235 3 Question A.9.8: Can I have permission to put PuTTY on a cover disk / distribute it with other software / etc?=t00000236 3 Question A.9.9: Can you sign an agreement indemnifying us against security problems in PuTTY?=t00000237 3 Question A.9.10: Can you sign this form granting us permission to use/distribute PuTTY?=t00000238 3 Question A.9.11: Can you write us a formal notice of permission to use PuTTY?=t00000239 3 Question A.9.12: Can you sign anything for us?=t00000240 3 Question A.9.13: If you won't sign anything, can you give us some sort of assurance that you won't make PuTTY closed-source in future?=t00000241 3 Question A.9.14: Can you provide us with export control information / FIPS certification for PuTTY?=t00000242 2 Section A.10: Miscellaneous questions 3 Section A.10: Miscellaneous questions=t00000243 3 Question A.10.1: Is PuTTY a port of OpenSSH, or based on OpenSSH or OpenSSL?=t00000244 3 Question A.10.2: Where can I buy silly putty?=t00000245 3 Question A.10.3: What does <20>PuTTY<54> mean?=t00000246 3 Question A.10.4: How do I pronounce <20>PuTTY<54>?=t00000247 1 Appendix B: Feedback and bug reporting 2 Appendix B: Feedback and bug reporting=t00000248 2 Section B.1: General guidelines 3 Section B.1: General guidelines=t00000249 3 Section B.1.1: Sending large attachments=t00000250 3 Section B.1.2: Other places to ask for help=t00000251 1 Section B.2: Reporting bugs=t00000252 1 Section B.3: Requesting extra features=t00000253 1 Section B.4: Requesting features that have already been requested=t00000254 1 Section B.5: Support requests=t00000255 1 Section B.6: Web server administration=t00000256 1 Section B.7: Asking permission for things=t00000257 1 Section B.8: Mirroring the PuTTY web site=t00000258 1 Section B.9: Praise and compliments=t00000259 1 Section B.10: E-mail address=t00000260 1 Appendix C: PuTTY Licence 2 Appendix C: PuTTY Licence=t00000261 1 Appendix D: PuTTY hacking guide 2 Appendix D: PuTTY hacking guide=t00000262 2 Section D.1: Cross-OS portability=t00000263 2 Section D.2: Multiple backends treated equally=t00000264 2 Section D.3: Multiple sessions per process on some platforms=t00000265 2 Section D.4: C, not C++=t00000266 2 Section D.5: Security-conscious coding=t00000267 2 Section D.6: Independence of specific compiler=t00000268 2 Section D.7: Small code size=t00000269 2 Section D.8: Single-threaded code=t00000270 2 Section D.9: Keystrokes sent to the server wherever possible=t00000271 2 Section D.10: 640<34>480 friendliness in configuration panels=t00000272 2 Section D.11: Automatically generated Makefiles=t00000273 2 Section D.12: Coroutines in ssh.c=t00000274 2 Section D.13: Single compilation of each source file=t00000275 2 Section D.14: Do as we say, not as we do=t00000276 1 Appendix E: PuTTY download keys and signatures 2 Appendix E: PuTTY download keys and signatures=pgpfingerprints 2 Section E.1: Public keys=t00000277 2 Section E.2: Security details 3 Section E.2: Security details=t00000278 3 Section E.2.1: The Development Snapshots keys=t00000279 3 Section E.2.2: The Releases keys=t00000280 3 Section E.2.3: The Master Keys=t00000281 1 Appendix F: SSH-2 names specified for PuTTY 2 Appendix F: SSH-2 names specified for PuTTY=t00000282 2 Section F.1: Connection protocol channel request names=t00000283 2 Section F.2: Key exchange method names=t00000284 2 Section F.3: Encryption algorithm names=t00000285
</body>
</html>