In SSH, some possible server authentication methods require user input (for example, password authentication, or entering a private key passphrase), and others do not (e.g. a private key held in Pageant).
If you use Plink to run an interactive login session, and if Plink authenticates without needing any user interaction, and if the server is malicious or compromised, it could try to trick you into giving it authentication data that should not go to the server (such as your private key passphrase), by sending what looks like one of Plink's local prompts, as if Plink had not already authenticated.
To protect against this, Plink's default policy is to finish the authentication phase with a final trivial prompt looking like this:
Access granted. Press Return to begin session.
so that if you saw anything that looked like an authentication prompt after that line, you would know it was not from Plink.
That extra interactive step is inconvenient. So Plink will turn it off in as many situations as it can:
But if you still find the protective prompt inconvenient, and you trust the server not to try a trick like this, you can turn it off using the ‘-no-antispoof
’ option.