mirror of
https://git.tartarus.org/simon/putty.git
synced 2025-07-01 03:22:48 -05:00
Merge the 0.74 release branch back to master.
Two minor memory-leak fixes on 0.74 seem not to be needed on master: the fix in an early exit path of pageant_add_keyfile is done already on master in a different way, and the missing sfree(fdlist) in uxsftp.c is in code that's been completely rewritten in the uxcliloop refactoring. Other minor conflicts: the rework in commit b52641644905 of ssh1login.c collided with the change from FLAG_VERBOSE to seat_verbose(), and master and 0.74 each added an unrelated extra field to the end of struct SshServerConfig.
This commit is contained in:
@ -2602,6 +2602,27 @@ If the first key type PuTTY finds is below the \q{warn below here}
|
||||
line, you will see a warning box when you make the connection, similar
|
||||
to that for cipher selection (see \k{config-ssh-encryption}).
|
||||
|
||||
\S{config-ssh-prefer-known-hostkeys} Preferring known host keys
|
||||
|
||||
By default, PuTTY will adjust the preference order for host key
|
||||
algorithms so that any host keys it already knows are moved to the top
|
||||
of the list.
|
||||
|
||||
This prevents you from having to check and confirm a new host key for
|
||||
a server you already had one for (e.g. because the server has
|
||||
generated an alternative key of a type higher in PuTTY's preference
|
||||
order, or because you changed the preference order itself).
|
||||
|
||||
However, on the other hand, it can leak information to a listener in
|
||||
the network about \e{whether} you already know a host key for this
|
||||
server.
|
||||
|
||||
For this reason, this policy is configurable. By turning this checkbox
|
||||
off, you can reset PuTTY to always use the exact order of host key
|
||||
algorithms configured in the preference list described in
|
||||
\k{config-ssh-hostkey-order}, so that a listener will find out nothing
|
||||
about what keys you had stored.
|
||||
|
||||
\S{config-ssh-kex-manual-hostkeys} \ii{Manually configuring host keys}
|
||||
|
||||
In some situations, if PuTTY's automated host key management is not
|
||||
|
@ -39,9 +39,9 @@ Once you've got a console window to type into, you can just type
|
||||
version of Plink you're using, and gives you a brief summary of how to
|
||||
use Plink:
|
||||
|
||||
\c Z:\sysosd>plink
|
||||
\c C:\>plink
|
||||
\c Plink: command-line connection utility
|
||||
\c Release 0.73
|
||||
\c Release 0.74
|
||||
\c Usage: plink [options] [user@]host [command]
|
||||
\c ("host" can also be a PuTTY saved session name)
|
||||
\c Options:
|
||||
@ -100,7 +100,7 @@ Once this works, you are ready to use Plink.
|
||||
To make a simple interactive connection to a remote server, just
|
||||
type \c{plink} and then the host name:
|
||||
|
||||
\c Z:\sysosd>plink login.example.com
|
||||
\c C:\>plink login.example.com
|
||||
\c
|
||||
\c Debian GNU/Linux 2.2 flunky.example.com
|
||||
\c flunky login:
|
||||
@ -117,7 +117,7 @@ In order to connect with a different protocol, you can give the
|
||||
command line options \c{-ssh}, \c{-telnet}, \c{-rlogin} or \c{-raw}.
|
||||
To make an SSH connection, for example:
|
||||
|
||||
\c Z:\sysosd>plink -ssh login.example.com
|
||||
\c C:\>plink -ssh login.example.com
|
||||
\c login as:
|
||||
|
||||
If you have already set up a PuTTY saved session, then instead of
|
||||
@ -125,7 +125,7 @@ supplying a host name, you can give the saved session name. This
|
||||
allows you to use public-key authentication, specify a user name,
|
||||
and use most of the other features of PuTTY:
|
||||
|
||||
\c Z:\sysosd>plink my-ssh-session
|
||||
\c C:\>plink my-ssh-session
|
||||
\c Sent username "fred"
|
||||
\c Authenticating with public key "fred@winbox"
|
||||
\c Last login: Thu Dec 6 19:25:33 2001 from :0.0
|
||||
@ -196,18 +196,18 @@ Once you have done all this, you should be able to run a remote
|
||||
command on the SSH server machine and have it execute automatically
|
||||
with no prompting:
|
||||
|
||||
\c Z:\sysosd>plink login.example.com -l fred echo hello, world
|
||||
\c C:\>plink login.example.com -l fred echo hello, world
|
||||
\c hello, world
|
||||
\c
|
||||
\c Z:\sysosd>
|
||||
\c C:\>
|
||||
|
||||
Or, if you have set up a saved session with all the connection
|
||||
details:
|
||||
|
||||
\c Z:\sysosd>plink mysession echo hello, world
|
||||
\c C:\>plink mysession echo hello, world
|
||||
\c hello, world
|
||||
\c
|
||||
\c Z:\sysosd>
|
||||
\c C:\>
|
||||
|
||||
Then you can set up other programs to run this Plink command and
|
||||
talk to it as if it were a process on the server machine.
|
||||
|
@ -37,9 +37,9 @@ Once you've got a console window to type into, you can just type
|
||||
version of PSCP you're using, and gives you a brief summary of how to
|
||||
use PSCP:
|
||||
|
||||
\c Z:\owendadmin>pscp
|
||||
\c C:\>pscp
|
||||
\c PuTTY Secure Copy client
|
||||
\c Release 0.73
|
||||
\c Release 0.74
|
||||
\c Usage: pscp [options] [user@]host:source target
|
||||
\c pscp [options] source [source...] [user@]host:target
|
||||
\c pscp [options] -ls [user@]host:filespec
|
||||
|
Reference in New Issue
Block a user