Deleted Added
full compact
scp.0 (207311) scp.0 (214979)
1SCP(1) OpenBSD Reference Manual SCP(1)
2
3NAME
4 scp - secure copy (remote file copy program)
5
6SYNOPSIS
7 scp [-1246BCpqrv] [-c cipher] [-F ssh_config] [-i identity_file]
8 [-l limit] [-o ssh_option] [-P port] [-S program]
1SCP(1) OpenBSD Reference Manual SCP(1)
2
3NAME
4 scp - secure copy (remote file copy program)
5
6SYNOPSIS
7 scp [-1246BCpqrv] [-c cipher] [-F ssh_config] [-i identity_file]
8 [-l limit] [-o ssh_option] [-P port] [-S program]
9 [[user@]host1:]file1 ... [[user@]host2:]file2
9 [[user@]host1:]file1 ... [[user@]host2:]file2
10
11DESCRIPTION
12 scp copies files between hosts on a network. It uses ssh(1) for data
13 transfer, and uses the same authentication and provides the same security
14 as ssh(1). Unlike rcp(1), scp will ask for passwords or passphrases if
15 they are needed for authentication.
16
17 File names may contain a user and host specification to indicate that the
10
11DESCRIPTION
12 scp copies files between hosts on a network. It uses ssh(1) for data
13 transfer, and uses the same authentication and provides the same security
14 as ssh(1). Unlike rcp(1), scp will ask for passwords or passphrases if
15 they are needed for authentication.
16
17 File names may contain a user and host specification to indicate that the
18 file is to be copied to/from that host. Local file names can be made ex-
19 plicit using absolute or relative pathnames to avoid scp treating file
18 file is to be copied to/from that host. Local file names can be made
19 explicit using absolute or relative pathnames to avoid scp treating file
20 names containing `:' as host specifiers. Copies between two remote hosts
21 are also permitted.
22
23 The options are as follows:
24
25 -1 Forces scp to use protocol 1.
26
27 -2 Forces scp to use protocol 2.
28
29 -4 Forces scp to use IPv4 addresses only.
30
31 -6 Forces scp to use IPv6 addresses only.
32
20 names containing `:' as host specifiers. Copies between two remote hosts
21 are also permitted.
22
23 The options are as follows:
24
25 -1 Forces scp to use protocol 1.
26
27 -2 Forces scp to use protocol 2.
28
29 -4 Forces scp to use IPv4 addresses only.
30
31 -6 Forces scp to use IPv6 addresses only.
32
33 -B Selects batch mode (prevents asking for passwords or passphras-
34 es).
33 -B Selects batch mode (prevents asking for passwords or
34 passphrases).
35
35
36 -C Compression enable. Passes the -C flag to ssh(1) to enable com-
37 pression.
36 -C Compression enable. Passes the -C flag to ssh(1) to enable
37 compression.
38
39 -c cipher
40 Selects the cipher to use for encrypting the data transfer. This
41 option is directly passed to ssh(1).
42
43 -F ssh_config
44 Specifies an alternative per-user configuration file for ssh.
45 This option is directly passed to ssh(1).

--- 69 unchanged lines hidden (view full) ---

115 rcp(1).
116
117 -p Preserves modification times, access times, and modes from the
118 original file.
119
120 -q Quiet mode: disables the progress meter as well as warning and
121 diagnostic messages from ssh(1).
122
38
39 -c cipher
40 Selects the cipher to use for encrypting the data transfer. This
41 option is directly passed to ssh(1).
42
43 -F ssh_config
44 Specifies an alternative per-user configuration file for ssh.
45 This option is directly passed to ssh(1).

--- 69 unchanged lines hidden (view full) ---

115 rcp(1).
116
117 -p Preserves modification times, access times, and modes from the
118 original file.
119
120 -q Quiet mode: disables the progress meter as well as warning and
121 diagnostic messages from ssh(1).
122
123 -r Recursively copy entire directories. Note that scp follows sym-
124 bolic links encountered in the tree traversal.
123 -r Recursively copy entire directories. Note that scp follows
124 symbolic links encountered in the tree traversal.
125
126 -S program
127 Name of program to use for the encrypted connection. The program
128 must understand ssh(1) options.
129
130 -v Verbose mode. Causes scp and ssh(1) to print debugging messages
131 about their progress. This is helpful in debugging connection,
132 authentication, and configuration problems.

--- 7 unchanged lines hidden (view full) ---

140HISTORY
141 scp is based on the rcp(1) program in BSD source code from the Regents of
142 the University of California.
143
144AUTHORS
145 Timo Rinne <tri@iki.fi>
146 Tatu Ylonen <ylo@cs.hut.fi>
147
125
126 -S program
127 Name of program to use for the encrypted connection. The program
128 must understand ssh(1) options.
129
130 -v Verbose mode. Causes scp and ssh(1) to print debugging messages
131 about their progress. This is helpful in debugging connection,
132 authentication, and configuration problems.

--- 7 unchanged lines hidden (view full) ---

140HISTORY
141 scp is based on the rcp(1) program in BSD source code from the Regents of
142 the University of California.
143
144AUTHORS
145 Timo Rinne <tri@iki.fi>
146 Tatu Ylonen <ylo@cs.hut.fi>
147
148OpenBSD 4.7 February 8, 2010 3
148OpenBSD 4.8 February 8, 2010 OpenBSD 4.8