Fact-checked by Grok 2 weeks ago

PuTTY

PuTTY is a free and open-source , serial console, and network client software that implements the SSH, , rlogin, SUPDUP, and raw socket protocols to enable secure remote access and command-line sessions on distant computers. It provides an xterm-style graphical interface for interactive use, primarily designed for Windows but also ported to platforms. Originally developed by British programmer starting in 1996 and first publicly released in 1999, PuTTY gained SSH protocol support in 1998, rapidly becoming a widely adopted tool for secure network connections due to its lightweight design and lack of installation requirements. The software is distributed under the permissive , allowing free modification and redistribution, and is maintained by Tatham along with a team of volunteer contributors. As of February 2025, the latest stable release is version 0.83, which includes enhancements for modern security practices and protocol compatibility. PuTTY's ecosystem extends beyond its core terminal functionality through integrated companion tools: PSCP for secure file copying over SSH, PSFTP for interactive secure file transfers, Plink for non-interactive command-line SSH sessions, Pageant as an SSH agent to manage , and PuTTYgen for generating and converting SSH key pairs. These utilities support advanced features like public-key , , X11 forwarding for graphical applications, and configurable session saving, making PuTTY suitable for both novice users and system administrators handling remote server management.

Overview

Purpose and Functionality

PuTTY is a free and open-source , serial console, and network client software designed primarily for Windows platforms. It serves as a versatile client for establishing remote connections, enabling users to interact with distant systems through text-based interfaces. Its core purpose revolves around facilitating secure and efficient remote server management, making it a staple tool for system administrators and developers working with environments from Windows machines. The application's primary functions include supporting SSH, , and connections to allow command-line access to remote hosts for administration tasks such as software installation, configuration changes, and monitoring. It also enables file transfers between local and remote systems using protocols like and , with dedicated utilities for these operations. Key use cases encompass secure remote access to servers, where PuTTY provides an intuitive for executing commands and managing resources without graphical dependencies. Additionally, it offers basic scripting support through command-line interfaces, allowing automation of connection and transfer tasks in batch processes or scripts. At a high level, supports network protocols including SSH versions 1 and 2 for encrypted sessions, and rlogin for unencrypted connections, as well as raw sockets for custom applications. For file transfers, it integrates for secure copy operations and for interactive file management, both accessible via command-line tools within the suite. Serial connections further extend its utility to hardware devices like routers or embedded systems. Renowned for its lightweight design, operates as a single executable file with no reliance on external libraries or DLLs, ensuring portability and minimal resource usage across deployments.

Development and Licensing

PuTTY was originally developed by , a programmer, beginning in the summer of 1996 as a personal project to create a Windows-based graphical client with an integrated for improved remote access capabilities. The project evolved to include SSH support, with the first usable SSH-2 implementation available by October 2000, addressing the need for secure connections on Windows systems where such tools were limited at the time. This initial development laid the foundation for PuTTY's role as an accessible SSH client, driven by Tatham's individual efforts without commercial backing. Today, PuTTY is maintained by a volunteer team coordinated through the official PuTTY project website at chiark.greenend.org.uk, with Simon Tatham serving as the lead developer. The source code is hosted in a public Git repository at git.tartarus.org/simon/putty.git, enabling community contributions and transparency in ongoing development. This volunteer-driven model fosters accessibility, as the project relies on contributions from users and developers worldwide to address bugs, add features, and ensure compatibility with evolving standards, without any formal income or corporate sponsorship. PuTTY is released under the , a permissive that permits free use, modification, and distribution of the software in both source and binary forms, with no royalties required and only minimal attribution obligations. This licensing choice enhances its widespread adoption by allowing integration into other projects and commercial products while maintaining its core as freely available software. executables are provided for Windows in 32-bit x86, 64-bit x86, and 64-bit formats via the official page, with the latest release (version 0.83 as of February 2025) including installers and portable versions for easy deployment. The full is also available for , supporting compilation on systems such as and macOS, which promotes cross-platform usability without dependency on tools. Efforts to enhance portability have been ongoing since the early , when native builds for Unix platforms were first made available, allowing PuTTY to run directly on non-Windows environments with minimal configuration. Support for architectures includes native binaries for since 2019 and compilation for systems via source builds. These developments underscore PuTTY's commitment to open accessibility across diverse hardware and operating systems.

History

Origins and Early Development

Development of what would become PuTTY began in summer 1996 when , a British programmer, started writing a Windows GUI client with capabilities, initially named 'STel', due to his dissatisfaction with existing tools. Tatham, then a university student, developed it to meet his own needs for a simple, portable during his academic work, drawing inspiration from Unix tools like . In summer 1998, Tatham added SSH-1 support to the client and renamed it , evolving it into a multi-protocol application. The initial public release, version 0.43, occurred on January 22, 1999, distributed as a single standalone executable file without an installer or manual, emphasizing its lightweight and portable design. This version provided basic support for and SSH-1 connections, allowing users to securely access remote systems via command-line interfaces. Early feedback from users highlighted its utility in filling the gap for Windows users seeking alternatives to commercial or Unix-centric SSH implementations. In its first expansions, PuTTY gained SSH-2 protocol support with version 0.50, released on October 16, 2000, enhancing security through improved encryption and authentication mechanisms over the older SSH-1 standard. This update marked a significant step in making PuTTY a more robust tool for secure remote access, aligning with the growing adoption of SSH-2 in the early . Around 2001, the project began receiving contributions from other developers, such as Jacob Nevins, fostering the formation of a loose development team that collaborated on refinements and additional features.

Major Releases and Milestones

PuTTY's development has seen steady progress since the mid-2000s, with major releases focusing on stability, cross-platform support, and security enhancements. Version 0.60, released on April 29, 2007, represented a significant update with extensive bug fixes, including improvements to protocol handling for better reliability in secure connections, alongside refinements to the terminal emulation and configuration interface. In 2013, version 0.63 marked an important expansion by providing more robust support for systems, building on earlier experimental ports and enabling broader usability beyond Windows environments. This release addressed several security vulnerabilities, such as buffer overruns in SSH-2 servers, while enhancing compatibility for non-Windows deployments. Further advancements in Unix integration came with version 0.67 in 2016, which introduced official Unix builds of the GUI tools using GTK 3 and a Unix version of Pageant for agent forwarding. Version 0.70, released in July 2017, brought notable improvements to capabilities, including enhanced throughput for faster and more efficient secure file operations over SSH. This update also incorporated cryptographic enhancements, such as support for additional SSH-2 cipher modes, solidifying PuTTY's role in secure network administration. The 20th anniversary release, version 0.73 in September 2019, celebrated two decades of development with key upgrades to support, allowing better handling of international characters in sessions, alongside security fixes for and bracketed paste mode. Security has remained a in subsequent releases, particularly post-2020, with multiple patches addressing critical issues; for instance, version 0.81 in April 2024 fixed a high-severity (CVE-2024-31497) in ECDSA key handling that could enable server-side attacks. Version 0.68 from 2017 had already standardized 64-bit Windows binaries, enabling (ASLR) and Data Execution Prevention (DEP) for improved protection against exploits. Experimental builds emerged around 2019 for compatibility, evolving into official 64-bit ARM64 binaries by version 0.83 in February 2025, supporting mobile and embedded devices while maintaining PuTTY's relevance alongside alternatives like through ongoing maintenance and Windows-specific features (as of November 2025).

Features

Terminal Emulation

PuTTY provides robust terminal emulation capabilities, primarily adhering to established standards for compatibility with legacy and modern systems. It fully supports the terminal standard, which includes essential control sequences for cursor movement, screen clearing, and basic text attributes, ensuring seamless interaction with applications expecting this baseline emulation. Additionally, PuTTY implements full extensions, such as advanced character sets and double-width characters, while offering comprehensive emulation for features like tracking and color support. Partial compatibility with the is maintained, particularly for core functions like printing and basic escape sequences, though some proprietary DEC extensions are not implemented. Character encoding in PuTTY is highly flexible to accommodate diverse remote systems. By default, it assumes incoming data uses encoding, enabling broad support for characters, including international scripts and symbols. Users can configure alternative encodings such as ISO-8859-1 for Latin-1 text or for Western European characters, with automatic font rendering to display glyphs correctly when a suitable font is selected. This setup ensures accurate representation of text from various locales without . Display features enhance usability during extended sessions. The terminal window size is fully configurable, allowing adjustments to rows and columns to match remote application requirements, with options for resizing during . A configurable scrollback that can store up to lines of output, permitting users to review historical session data via a or shortcuts. Color schemes are customizable, supporting ANSI 256-color palettes and (24-bit) for vivid rendering of application output, while anti-aliased fonts improve readability on high-DPI displays through integration with Windows font smoothing technologies. support was added in version 0.82 (November 2024). Keyboard and mouse handling are tailored for precise control in emulated environments. PuTTY offers extensive customizable key mappings, allowing users to redefine function keys, modifiers, and special sequences to match specific terminal behaviors or application needs, such as aligning with or conventions. Mouse support includes xterm-style reporting, where clicks and drags are transmitted as escape sequences to the remote , enabling interactive features in tools like vim for selection and navigation without disrupting local copy-paste operations. This can be toggled to prioritize local mouse actions when needed. Recent enhancements have addressed limitations in Unicode handling, particularly for modern text features. In version 0.82, released in late 2024, PuTTY underwent a major refactoring of its system, enabling proper display and input of complex characters like emojis in terminal output and bidirectional (BiDi) text for languages such as and Hebrew, improving for international users. These updates build on post-2019 improvements, ensuring robust support for 15.0 and later standards without fallback to legacy modes.

Network Protocols and Connections

PuTTY primarily supports the (SSH) protocol for secure remote access, with compatibility for both (legacy) and version 2 (preferred). SSH-2, the current standard, provides enhanced security features including stronger encryption algorithms and integrity protection compared to the vulnerable SSH-1. Public-key authentication is fully implemented, allowing users to authenticate using key pairs generated via PuTTYgen or managed by Pageant, without relying on passwords. Additionally, SSH connections in PuTTY support data compression using the zlib algorithm, which reduces bandwidth usage on slow networks by compressing data before transmission; this can be enabled via the configuration option or the command-line flag -C. Beyond SSH, accommodates several other protocols for less secure or specialized connections. provides unencrypted remote login, suitable for legacy systems but lacking modern security. Rlogin, another unencrypted protocol, enables remote access primarily on systems with minimal authentication. Raw connections allow direct socket communication to any port, useful for custom applications or debugging. For local hardware access, supports (COM port) connections, transmitting data directly to serial devices without involvement. In the 0.83 release of February 2025, support for the SUPDUP protocol was added, enabling connections to ancient systems like PDP-10s. Secure file transfer is integrated through dedicated utilities: PSCP implements the protocol for simple, secure file copying over SSH, supporting both versions 1 and 2, while PSFTP provides an interactive client based on SSH-2, offering directory listings, wildcard operations, and resumable transfers for more advanced usage. These tools leverage the same authentication mechanisms as PuTTY's SSH sessions, ensuring consistent security for uploads and downloads. Establishing a in begins with specifying the target hostname or and selecting the type, with default ports such as for SSH, 23 for , and 513 for Rlogin. Users can override ports explicitly, and addresses are supported natively via the -6 command-line option or address resolution preferences. support facilitates connections through intermediaries, including HTTP proxies (using the CONNECT method), SOCKS4, and SOCKS5; for proxies, such as username/ for SOCKS5, is handled interactively. Post-2020 enhancements, culminating in the 0.83 release, improved proxy robustness with better handling in proxy negotiations and TLS-secured proxy connections for enhanced privacy in restricted networks.

Configuration and Usability

PuTTY features a graphical dialog that serves as the primary for managing session settings, accessible upon launching the application or via the "Change Settings" option during an active session. This dialog is organized into key categories—Session, , , , , and —enabling users to tailor connections, appearance, and behavior to their needs. The Session category handles basic connection details such as hostname, port, protocol selection (e.g., SSH, ), and close-window-on-exit behavior, while also providing a list for loading saved sessions. Saved sessions allow users to store complete profiles, including all settings, for rapid reuse; profiles can be named, edited, or deleted within the dialog, and loaded automatically on startup by specifying the session name. This feature supports multiple profiles for different hosts or environments, with options to save sensitive data like passwords—though PuTTY issues warnings about the risks of storing credentials in the . Command-line invocation via the -load flag further enhances scripting capabilities, allowing automated launches of predefined sessions from batch files or other tools. In the Logging category, users configure output recording to text files, with choices for session transcripts, SSH packet data, or both, including automatic timestamping and file rotation to prevent excessive growth. The Terminal category offers controls for input handling, such as translations and line discipline modes, alongside features like beep suppression—selectable as visual flash, flash, or none to minimize distractions. These options improve daily by reducing interruptions and enhancing without delving into emulation standards. The category manages visual elements, including resize behavior, scrollback size, font selection, and color palettes, where users can define custom schemes for foreground, background, and ANSI colors to achieve high-contrast displays or dark themes suited to low-light environments. is bolstered by extensive shortcuts, such as Ctrl+Shift+C/V for copy/paste (configurable to right-click paste), and seamless integration with the Windows for text exchange between PuTTY and other applications. Position and size settings ensure consistent window placement across sessions. Connection settings encompass intervals to facilitate auto-reconnection after drops by periodically sending null packets, preventing timeouts during idle periods. The subcategory refines details, like the terminal-type string advertised to the remote and automatic username entry, streamlining initial connections. In version 0.83, usability refinements include improved session management stability, making profile handling more reliable for frequent users. For contemporary setups, PuTTY supports connections to 2 (WSL2) by targeting localhost on the configured SSH port within WSL, a common practice for local development workflows.

Components

Core Applications

The core applications of the PuTTY suite consist of three primary executable programs designed for direct user interaction with remote systems: PuTTY, Plink, and PSFTP. These tools facilitate secure and non-secure network connections, emphasizing ease of use on Windows platforms while supporting compilation for other systems. PuTTY (putty.exe) serves as the flagship (GUI) , enabling interactive sessions over SSH, , rlogin, and raw protocols. Users launch it to open a resizable window displaying a remote , where they can enter commands, view output, and manage connections through a dialog for settings like addresses, numbers, and methods. This application is particularly suited for visual, interaction, such as system administration or on remote servers. Plink (plink.exe) functions as the (CLI) equivalent to , optimized for non-interactive and automated connections via SSH, , or rlogin. It operates directly from a or batch scripts, allowing users to execute remote commands without a graphical window—for instance, running plink user@host command to perform tasks like backups or log checks. Plink supports the same options as but excels in scripting environments, such as integration with for on Windows. PSFTP (psftp.exe) provides an interactive CLI client specifically for Secure File Transfer Protocol (SFTP) operations over SSH, enabling secure uploads, downloads, and directory management from the command line. Users interact via a prompt with commands like get for downloading files, put for uploading, ls for listing contents, and rm for deletions, making it ideal for scripted file transfers in automated workflows. Unlike general-purpose tools, PSFTP focuses exclusively on SFTP, ensuring encrypted handling of file metadata and contents. These applications differ in their interaction paradigms: offers a visual, session-oriented experience for manual use, while Plink and PSFTP prioritize command-line efficiency for and targeted tasks like batch jobs or file operations. All three can briefly interface with auxiliary tools like agents for seamless during sessions. On Windows, they are distributed as standalone executables in 32-bit and 64-bit variants since version 0.68 (); the 64-bit builds provide improved performance on modern hardware by leveraging larger memory addressing and optimized instruction sets. Unix-like equivalents, such as command-line ports of and Plink, are available by compiling the open-source code.

Supporting Utilities

PuTTY's supporting utilities provide essential tools for , , and secure , complementing the core applications by handling preparatory and background tasks. PuTTYgen (puttygen.exe) is a graphical key generator and conversion utility that enables users to create pairs of public and private SSH keys using algorithms such as and Ed25519. It supports generating keys in the proprietary PuTTY Private Key (.ppk) format and converting between formats like OpenSSH and .ppk, facilitating compatibility within the PuTTY ecosystem. Ed25519 support was introduced in PuTTY version 0.68, released on February 21, 2017, allowing for faster and more secure key generation compared to older options. Pageant (pageant.exe) functions as an SSH authentication agent that runs in the background as a Windows system tray application, caching decrypted private keys in memory to enable seamless across multiple PuTTY sessions without repeated passphrase entry. It integrates with PuTTY, PSCP, and other suite tools by exposing an interface, allowing them to query cached keys for public key . PSCP (pscp.exe) serves as a non-interactive command-line client for the (SCP), enabling scripted or automated secure file transfers between local and remote systems over SSH. It supports recursive copies, wildcards, and options for preserving , making it suitable for batch operations in environments requiring unattended file management. These utilities interoperate closely: PuTTYgen produces .ppk files that Pageant can load and cache, which in turn supply authentication credentials to PSCP and PuTTY applications, streamlining workflows for key-based SSH access. PuTTY version 0.83 (2025) introduced support for post-quantum algorithms like ML-KEM in the SSH protocol.

Security Considerations

Known Vulnerabilities

PuTTY has experienced several documented security vulnerabilities over its development history, primarily related to its implementation of the SSH protocol and associated components. One early issue, identified in 2008, involved a weakness in the SSH-2 protocol when using Cipher Block Chaining (CBC) mode ciphers. This flaw, tracked as CVE-2008-5161, allowed remote attackers to recover plaintext data from the packet length fields in SSH sessions due to predictable padding oracle behavior. The vulnerability was patched in PuTTY version 0.61 by disabling CBC modes by default and recommending stronger ciphers. In 2019, a significant flaw was discovered in the WinPageant component, which handles SSH agent forwarding on Windows. This issue enabled a malicious program to impersonate the legitimate Pageant , potentially allowing unauthorized to stored private keys or of requests during SSH connections. The affected versions prior to 0.73 and was fixed in that release through improved checks and validation of agent communications. A more recent protocol-level emerged in 2023, involving a in SSH packet handling that could be exploited as part of the Terrapin attack family. Designated CVE-2023-48795, this flaw permitted man-in-the-middle attackers to degrade the security of SSH sessions by truncating packets and bypassing integrity protections, potentially enabling or keystroke timing attacks. mitigated this in version 0.80 by implementing strict packet sequence enforcement and disabling vulnerable extensions. In April 2024, a critical was fixed in 0.81, tracked as CVE-2024-31497. This issue involved biased generation during ECDSA signature creation with NIST P-521 (ecdsa-sha2-nistp521) keys, allowing an attacker to recover the private key after observing approximately 60 valid signatures from the affected client. The flaw affected versions 0.68 through 0.80 and was addressed by improving the of generation in the signing process. In version 0.83, released on February 8, 2025, addressed a security-related bug where the private half of users' keys was inadvertently retained in memory after . This could have exposed keys to risks such as memory dumps. The fix ensures keys are cleared from post-use, enhancing against memory-based attacks. No CVE was assigned to this . As of November 2025, has no known active zero-day vulnerabilities, with the project maintaining a strong track record of timely patches. Users are strongly encouraged to update to the latest version, currently 0.83, to ensure against these and any emerging threats.

Secure Usage Recommendations

To ensure secure connections with , users should configure it to use only the SSH-2 , as SSH-1 contains known cryptographic weaknesses and is no longer considered secure by the developers. In the configuration panel under > SSH, select "2 only" for the preferred SSH version to prevent fallback to the insecure SSH-1. Additionally, disable support for unused protocols such as and Rlogin in the Session category, as these transmit data in and expose credentials to on untrusted networks. For authentication, prioritize public key-based methods over passwords to mitigate risks from brute-force attacks and keylogging . Generate strong keys using PuTTYgen, preferring modern algorithms like Ed25519 for their efficiency and resistance to certain cryptanalytic attacks, and distribute only the public portion to servers. In PuTTY's , navigate to > SSH > Auth and specify the private key file; disable password if keys are in use by unchecking "Attempt authentication using Pageant" only if not utilizing the , but avoid saving session passwords in the config to prevent if the saved file is compromised. When employing Pageant for key management, load only passphrase-protected private keys to add a layer of in , and unload keys from the after sessions to minimize on shared or unattended machines. Regularly rotate keys using PuTTYgen's conversion tools, aiming for annual renewal or after potential compromise indicators, to limit the impact of any stolen credentials. Enable verbose logging in PuTTY under Session > Logging only when troubleshooting or auditing is necessary, setting the log type to "SSH packets" for detailed records, but store log files in encrypted locations or delete them post-use to avoid retaining sensitive session data. Complement this with host system firewall rules, such as , to restrict PuTTY's outbound connections to specific ports like 22 for SSH, reducing the from unintended protocol usage. For contemporary deployments on Windows in 2025, download and use the 64-bit version of , which benefits from enhanced security features like mandatory Data Execution Prevention (DEP) and better alignment with modern OS hardening. Always install the latest release from the official site to incorporate recent patches, such as those addressing retention issues, and verify keys on first to guard against man-in-the-middle attacks—manually compare fingerprints against trusted server-provided values rather than accepting defaults. While remains robust, consider integrating it with Windows Defender's application control policies for sandboxed execution on high-risk networks, and stay informed on transitions to built-in alternatives like for Windows to evaluate long-term compatibility.

References

  1. [1]
    PuTTY FAQ - Chiark.greenend.org.uk
    PuTTY is a client program for the SSH, Telnet, Rlogin, and SUPDUP network protocols. These protocols are all used to run a remote session on a computer, over a ...
  2. [2]
    PuTTY: a free SSH and Telnet client
    Aug 14, 2025 · PuTTY is a free implementation of SSH and Telnet for Windows and Unix platforms, along with an xterm terminal emulator.Download PuTTY: latest... · PuTTY FAQ · PuTTY Licence · PuTTY Links
  3. [3]
    PuTTY: What it's, Free Downloads, Tutorials, and How-Tos
    PuTTY is one of the oldest SSH clients for Windows. It was first released by Simon Tatham in 1998. SSH support was added in 2000. After 19 years, the software ...
  4. [4]
    Download PuTTY: latest release (0.83) - Chiark.greenend.org.uk
    Feb 10, 2025 · This page contains download links for the latest released version of PuTTY. Currently this is 0.83, released on 2025-02-08.PuTTY FAQ · PuTTY Updates · PuTTY Links · PuTTY Licence
  5. [5]
    puttydoc.txt
    PuTTY is a free (MIT-licensed) Windows Telnet and SSH client. This manual documents PuTTY, and its companion utilities PSCP, PSFTP, Plink, Pageant and PuTTYgen.
  6. [6]
    Using PuTTY
    This chapter provides a general introduction to some more advanced features of PuTTY. ... A lot of PuTTY's complexity and features are in the configuration panel.
  7. [7]
    PuTTY Documentation Page - Chiark.greenend.org.uk
    Feb 8, 2025 · This page links to the documentation for all current versions of PuTTY. The same links are available on the download pages.Missing: website functionality
  8. [8]
    PuTTY hacking guide
    PuTTY is tiny, compared to many other Windows applications. And it's easy to install: it depends on no DLLs, no other applications, no service packs or system ...
  9. [9]
    History of PuTTY's development - Chiark.greenend.org.uk
    Mar 24, 2020 · Most of the evolution of PuTTY, in terms of major features, was driven either by my own need for the feature, or someone else doing the work and sending ...
  10. [10]
    PuTTY Licence - Chiark.greenend.org.uk
    Feb 8, 2025 · The PuTTY executables and source code are distributed under the MIT licence, which is similar in effect to the BSD licence.
  11. [11]
    Porting PuTTY to Windows on Arm - Tools, Software and IDEs blog
    Mar 5, 2019 · After building the PuTTY executable files, there's one more thing done by the master build script: wrapping them into an MSI installer.Missing: Unix port 2000s 2024
  12. [12]
    Definition of PuTTY - PCMag
    Written initially for Windows in 1999 by British programmer Simon Tatham, PuTTY is also available for the Mac and Linux. The origin of the name was not ...
  13. [13]
    Ask HN: Which is the oldest software alive still in 0.x, used by many?
    Sep 29, 2023 · PuTTY's first Git commit shows "Fri Jan 8 13:02:13 1999" for beta 0.43, from r11 of SVN. https://www.chiark.greenend.org.uk/~sgtatham/putty/ ...
  14. [14]
    Download PuTTY: release 0.50
    This page contains download links for PuTTY release 0.50. 0.50, released on 2000-10-16, is not the latest release. See the Latest Release page for the most up- ...
  15. [15]
    The PuTTY Open Source Project on Open Hub
    took an estimated 44 years of effort (COCOMO model) starting with its first commit in January, 1999 ... Simon Tatham · SATO Kentaro · Jacob Nevins · Stefan Tauner.
  16. [16]
    Download PuTTY: release 0.60 - Chiark.greenend.org.uk
    Feb 8, 2025 · This page contains download links for PuTTY release 0.60. 0.60, released on 2007-04-29, is not the latest release. See the Latest Release page for the most up- ...Missing: 2009 refactor
  17. [17]
    PuTTY Change Log
    Feb 8, 2025 · These features were new in 0.74 (released 2020-06-27): Security fix: if an SSH server accepted an offer of a public key and then rejected the ...
  18. [18]
    Download PuTTY: release 0.63 - Chiark.greenend.org.uk
    Feb 8, 2025 · This page contains download links for PuTTY release 0.63. 0.63, released on 2013-08-06, is not the latest release. See the Latest Release page for the most up- ...
  19. [19]
    Download PuTTY: release 0.70 - Chiark.greenend.org.uk
    Feb 8, 2025 · This page contains download links for PuTTY release 0.70. 0.70, released on 2017-07-08, is not the latest release. See the Latest Release page for the most up- ...<|separator|>
  20. [20]
    Download PuTTY: release 0.73 - Chiark.greenend.org.uk
    Feb 8, 2025 · This page contains download links for PuTTY release 0.73. 0.73, released on 2019-09-29, is not the latest release. See the Latest Release page for the most up- ...Missing: 20th anniversary
  21. [21]
    PuTTY 0.81 security release - LWN.net
    Apr 16, 2024 · PuTTY 0.81, released today, fixes a critical vulnerability CVE-2024-31497 in the use of 521-bit ECDSA keys (ecdsa-sha2-nistp521).
  22. [22]
    -1 and -2: specify an SSH protocol version - PuTTY Documentation
    The -1 and -2 options force PuTTY to use version 1 or version 2 of the SSH protocol. These options are only meaningful if you are using SSH. These options are ...
  23. [23]
    Enable compression - PuTTY - Documentation & Help
    4.18.3 'Enable compression'. This enables data compression in the SSH connection: data sent by the server is compressed before sending, and decompressed at ...
  24. [24]
    Chapter 3: Using PuTTY
    The -C option enables compression of the data sent across the network. This option is only meaningful if you are using SSH. This option is equivalent to the " ...
  25. [25]
    Selecting a protocol: -ssh, -telnet, -rlogin, -raw -serial - PuTTY ...
    To choose which protocol you want to connect with, you can use one of these options: These options are not available in the file transfer tools PSCP and PSFTP.
  26. [26]
    Using PSCP to transfer files securely
    PSCP, the PuTTY Secure Copy client, is a tool for transferring files securely between computers using an SSH connection.Chapter 5: Using PSCP to... · Starting PSCP · PSCP Usage
  27. [27]
    Configuring PuTTY
    This chapter describes all the configuration options in PuTTY. PuTTY is configured using the control panel that comes up before you start a session.
  28. [28]
    -4 and -6: specify an Internet protocol version - PuTTY Documentation
    The -4 and -6 options force PuTTY to use the older Internet protocol IPv4 or the newer IPv6 for most outgoing connections. ... 'PuTTY X11 proxy: various errors' ...Missing: enhancements TLS 2020-2025
  29. [29]
    How to Install PuTTY SSH for Windows
    Sep 11, 2025 · The 32-bit version of PuTTY [version] installer.msi will run on all 32-bit and 64-bit versions of PC and Windows that PuTTY supports. · The 64- ...
  30. [30]
    Using PuTTYgen - WinSCP
    May 9, 2024 · PuTTYgen is a key generator. It generates pairs of public and private keys to be used with WinSCP. PuTTYgen generates RSA, DSA, ECDSA, and EdDSA keys.Missing: PSCP | Show results with:PSCP
  31. [31]
    PuTTY 0.68 is released
    Feb 21, 2017 · ... PuTTY 0.68: - Support for elliptic-curve cryptography. PuTTY now supports public and private keys using the Ed25519 signature algorithm, and ...
  32. [32]
    PuTTY semi-bug ssh2-cbc-pktlen-weakness - Chiark.greenend.org.uk
    Nov 27, 2008 · Client-to-server data need to be protected by similar action by the server. This problem is assigned vulnerability ids CVE-2008-5161 and US-CERT ...
  33. [33]
    PuTTY vulnerability vuln-terrapin - Chiark.greenend.org.uk
    Dec 18, 2023 · They have named this the 'Terrapin' attack, and it has been assigned CVE-2023-48795. PuTTY 0.80 will fully mitigate the protocol ...
  34. [34]
    Download PuTTY: release 0.81 - Chiark.greenend.org.uk
    Feb 8, 2025 · 0.81, released on 2024-04-15, is not the latest release. See the Latest Release page for the most up-to-date release (currently 0.83). Past ...
  35. [35]
    How to Use PuTTY on Windows - SSH Communications Security
    This page explains how to use the PuTTY terminal window on Windows. How to configure PuTTY, how to create and save profiles, and what configuration options ...<|separator|>
  36. [36]
  37. [37]
    How to use PuTTY for SSH key-based authentication | TechTarget
    Jul 25, 2024 · This tutorial on the open source PuTTY SSH client covers how to install it, its basic use, and step-by-step instructions for configuring key-based ...<|control11|><|separator|>
  38. [38]
    How to use PuTTY for SSH connections and authentication
    Sep 5, 2025 · Learn how to use PuTTY for secured connections to your OVHcloud service via the SSH protocol. PuTTY is an open-source SSH client software...Missing: utilities | Show results with:utilities
  39. [39]
    Connect to your Linux instance using PuTTY - AWS Documentation
    You can connect to your Linux instance using PuTTY, a free SSH client for Windows. If you're running Windows Server 2019 or later, we recommend that you use ...