CatgirlIntelligenceAgency/run/test-data/url-796905237

78 lines
10 KiB
Plaintext

<!DOCTYPE html PUBLIC "-//W3C//DTD HTML 4.01 Transitional//EN">
<html>
<head>
<title>PuTTY: a free SSH and Telnet client</title>
<link rel="canonical" href="https://www.chiark.greenend.org.uk/~sgtatham/putty/">
<link rel="stylesheet" type="text/css" href="sitestyle.css" title="PuTTY Home Page Style">
<link rel="shortcut icon" href="putty.ico">
<meta http-equiv="content-type" content="text/html; charset=US-ASCII">
<meta name="robots" content="noindex,nofollow">
</head>
<body>
<h1 align="center">PuTTY: a free SSH and Telnet client</h1>
<div align="center" class="mirrorwarning">
This is a mirror. Follow this link to find <a href="https://www.chiark.greenend.org.uk/~sgtatham/putty/">the primary PuTTY web site</a>.
</div>
<p align="center"> <b>Home</b> | <a href="faq.html">FAQ</a> | <a href="feedback.html">Feedback</a> | <a href="licence.html">Licence</a> | <a href="maillist.html">Updates</a> | <a href="mirrors.html">Mirrors</a> | <a href="keys.html">Keys</a> | <a href="links.html">Links</a> | <a href="team.html">Team</a> <br> Download: <a href="latest.html">Stable</a> &middot; <a href="snapshot.html">Snapshot</a> | <a href="docs.html">Docs</a> | <a href="changes.html">Changes</a> | <a href="wishlist/">Wishlist</a> </p>
<p> PuTTY is a free implementation of SSH and Telnet for Windows and Unix platforms, along with an <code>xterm</code> terminal emulator. It is written and maintained primarily by <a href="https://www.chiark.greenend.org.uk/~sgtatham/">Simon Tatham</a>. </p>
<p> The latest version is 0.70. <a href="latest.html"><b>Download it here</b></a>. </p>
<p><b>LEGAL WARNING</b>: Use of PuTTY, PSCP, PSFTP and Plink is illegal in countries where encryption is outlawed. We believe it is legal to use PuTTY, PSCP, PSFTP and Plink in England and Wales and in many other countries, but we are not lawyers, and so if in doubt you should seek legal advice before downloading it. You may find useful information at <a href="http://www.cryptolaw.org/">cryptolaw.org</a>, which collects information on cryptography laws in many countries, but we can't vouch for its correctness. </p>
<p> Use of the Telnet-only binary (PuTTYtel) is unrestricted by any cryptography laws. </p>
<h2>Latest news</h2>
<p> <b>2017-07-08 PuTTY 0.70 released, containing security and bug fixes</b> </p>
<p> PuTTY 0.70, released today, fixes further problems with Windows DLL hijacking, and also fixes a small number of bugs in 0.69, including broken printing support and Unicode keyboard input on Windows. </p>
<p> <b>2017-04-29 PuTTY 0.69 released, containing security and bug fixes</b> </p>
<p> PuTTY 0.69, released today, fixes further problems with Windows DLL hijacking, and also fixes a small number of bugs in 0.68, including broken MIT Kerberos support and the lack of jump lists on the Start Menu. </p>
<p> <b>2017-02-21 PuTTY 0.68 released, containing ECC, a 64-bit build, and security fixes</b> </p>
<p> PuTTY 0.68, released today, supports elliptic-curve cryptography for host keys, user authentication keys, and key exchange. Also, for the first time, it comes in a 64-bit Windows version. </p>
<p> 0.68 also contains some security fixes: a vulnerability in agent forwarding is fixed, and Windows DLL hijacking should no longer be possible. </p>
<p> <b>2017-01-21 Win64 builds and website redesign</b> </p>
<p> We're now offering 64-bit Windows builds of PuTTY, alongside the 32-bit ones we've always provided. </p>
<p> Right now, the 64-bit builds work as far as we know, but they haven't had as much testing as the 32-bit ones. So we're still considering the 32-bit builds to be more likely to be stable. However, if you have any reason to want to use a 64-bit build (e.g. it needs to load a 64-bit supporting DLL for something like GSSAPI), or if you just feel like trying out the new builds, then please let us know if you have any trouble. </p>
<p> We've also redesigned our website. The old Download page isn't there any more: instead, we have separate pages for the <a href="latest.html">latest release</a> and the <a href="snapshot.html">development snapshots</a>. Also, you can find past release builds of PuTTY by following links from the <a href="changes.html">Changes page</a>, in case those are useful to you. (However, most of them have known vulnerabilities these days; we don't recommend you use any vulnerable past release if you can avoid it.) </p>
<p> <b>2016-03-10 Switching to MSI-format Windows installer</b> </p>
<p> We're switching to the MSI format for PuTTY's Windows installer (generated by the <a href="http://wixtoolset.org/">WiX toolset</a>). </p>
<p> Mostly this is because of the <a href="https://packetstormsecurity.com/files/134694/jrsoft-dllhijack.txt">report</a> late last year that Windows installers created by Inno Setup are vulnerable to being hijacked by particular DLLs left in the same directory (such as your browser downloads directory). </p>
<p> However, MSI also provides some other useful features, including automated silent install/uninstall via <code>msiexec /q</code>, and also the ability to automatically put the PuTTY install directory on the <code>PATH</code> so that Command Prompts can run PSCP without any fuss. </p>
<p> The development snapshots will now have MSI installers, and we have also retrospectively generated an MSI installer for the recent 0.67 release. Sorry we didn't have it ready in time &#x2013; MSI is quite complicated if you're not an expert, and it took a long time to get it to work! </p>
<p> For the moment, we're still providing Inno Setup installers as well, in case anyone has trouble with our new and not-very-tested MSIs. But we recommend that people use the MSI if possible, and if you must use the Inno Setup installer, make sure to put it in an empty directory before running it. </p>
<p> <b>2016-03-05 PuTTY 0.67 released, fixing a SECURITY HOLE</b> </p>
<p> PuTTY 0.67, released today, fixes a <b>security hole</b> in 0.66 and before: <a href="wishlist/vuln-pscp-sink-sscanf.html">vuln-pscp-sink-sscanf</a>. It also contains a few other small bug fixes. </p>
<p> Also, for the first time, the Windows executables in this release (including the installer) are signed using an Authenticode certificate, to help protect against tampering in transit from our website or after downloading. You should find that they list "Simon Tatham" as the verified publisher. </p>
<p> <b>2015-11-07 PuTTY 0.66 released, fixing a SECURITY HOLE</b> </p>
<p> PuTTY 0.66, released today, fixes a <b>security hole</b> in 0.65 and before: <a href="wishlist/vuln-ech-overflow.html">vuln-ech-overflow</a>. It also contains a few other small bug fixes and minor features. </p>
<p> <b>2015-09-02 GPG key rollover</b> </p>
<p> This week we've generated a fresh set of GPG keys for signing PuTTY release and snapshot builds. We will begin signing snapshots with the new snapshot key, and future releases with the new release key. The new master key is signed with the old master keys, of course. See the <a href="keys.html">keys page</a> for more information. </p>
<p> <b>2015-07-25 PuTTY 0.65 released, containing bug fixes</b> </p>
<p> PuTTY 0.65, released today, fixes the Vista bug where the configuration dialog became invisible, and a few other bugs, large and small. </p>
<p> <b>2015-06-21 Pre-releases of 0.65 now available</b> </p>
<p> We're working towards a 0.65 release. This will be a bug-fix release: it will not contain the various new cryptographic features in the development snapshots, but it will contain large and small bug fixes over 0.64, including in particular a fix for the recent <a href="wishlist/vista-update-breaks-config.html">Vista-specific bug</a> in which the configuration dialog becomes invisible. We'd appreciate testing of the pre-release builds, which are available from the <a href="download.html">Download page</a> as usual. </p>
<p> <b>2015-05-19 Malware pretending to be PuTTY</b> </p>
<p> A Symantec <a href="http://www.symantec.com/connect/blogs/check-your-sources-trojanized-open-source-ssh-software-used-steal-information">blog post</a> warns that a trojaned copy of PuTTY has been detected in the wild. Fortunately, it's easily recognisable by its version identification ("Unidentified build, Nov 29 2013 21:41:02"). If you've encountered this version, we suggest you treat any machine that's run the malicious version as potentially compromised, change any passwords that might have been stolen, and resecure the accounts they protect. </p>
<p> <b>2015-04-19 PuTTY detected as malware</b> </p>
<p> We've had several reports recently of anti-virus software reporting PuTTY as malware (under a wide variety of names, often generic). This affects the latest release (0.64) and also the development snapshots (particularly puttygen.exe). </p>
<p> We believe these are false positives. In those cases where we've been able to contact the vendor (McAfee, Symantec, ClamAV), they have removed the detection. </p>
<p> However, most vendors' false-positive response is to whitelist specific binaries. While this will resolve detections of the 0.64 release, expect detections to recur with the development snapshots, which are built daily. </p>
<p> We've had no success requesting AV software vendors to perform more in-depth analysis. If this is causing trouble for you, and you have a support contract with your AV vendor, please query the detection with them directly. </p>
<h2>Site map</h2>
<ul>
<li> <a href="licence.html">Licence conditions</a> under which you may use PuTTY. </li>
<li> <a href="faq.html">The FAQ</a>. </li>
<li> <a href="docs.html">The documentation</a>. </li>
<li> Download PuTTY:
<ul>
<li><a href="latest.html">latest release</a> 0.70 </li>
<li><a href="snapshot.html">development snapshots</a> </li>
</ul> <br> </li>
<li> Subscribe to the <a href="maillist.html">PuTTY-announce</a> mailing list to be notified of new releases. </li>
<li> <a href="feedback.html">Feedback</a> and bug reporting: contact address and guidelines. <em>Please</em> read the guidelines before sending us mail; we get a very large amount of mail and it will help us answer you more quickly. </li>
<li> <a href="changes.html">Changes in recent releases</a>. </li>
<li> <a href="wishlist/">Wish list</a> and list of known bugs. </li>
<li> <a href="links.html">Links</a> to related software and specifications elsewhere. </li>
<li> A page about the PuTTY <a href="team.html">team members</a>. </li>
</ul>
<p></p>
<hr> If you want to comment on this web site, see the <a href="feedback.html">Feedback page</a>.
<br> (last modified on <!--LASTMOD-->Sat Jul 8 08:07:19 2017<!--END-->)
</body>
</html>