scp.0 (207311) | scp.0 (214979) |
---|---|
1SCP(1) OpenBSD Reference Manual SCP(1) 2 3NAME 4 scp - secure copy (remote file copy program) 5 6SYNOPSIS 7 scp [-1246BCpqrv] [-c cipher] [-F ssh_config] [-i identity_file] 8 [-l limit] [-o ssh_option] [-P port] [-S program] | 1SCP(1) OpenBSD Reference Manual SCP(1) 2 3NAME 4 scp - secure copy (remote file copy program) 5 6SYNOPSIS 7 scp [-1246BCpqrv] [-c cipher] [-F ssh_config] [-i identity_file] 8 [-l limit] [-o ssh_option] [-P port] [-S program] |
9 [[user@]host1:]file1 ... [[user@]host2:]file2 | 9 [[user@]host1:]file1 ... [[user@]host2:]file2 |
10 11DESCRIPTION 12 scp copies files between hosts on a network. It uses ssh(1) for data 13 transfer, and uses the same authentication and provides the same security 14 as ssh(1). Unlike rcp(1), scp will ask for passwords or passphrases if 15 they are needed for authentication. 16 17 File names may contain a user and host specification to indicate that the | 10 11DESCRIPTION 12 scp copies files between hosts on a network. It uses ssh(1) for data 13 transfer, and uses the same authentication and provides the same security 14 as ssh(1). Unlike rcp(1), scp will ask for passwords or passphrases if 15 they are needed for authentication. 16 17 File names may contain a user and host specification to indicate that the |
18 file is to be copied to/from that host. Local file names can be made ex- 19 plicit using absolute or relative pathnames to avoid scp treating file | 18 file is to be copied to/from that host. Local file names can be made 19 explicit using absolute or relative pathnames to avoid scp treating file |
20 names containing `:' as host specifiers. Copies between two remote hosts 21 are also permitted. 22 23 The options are as follows: 24 25 -1 Forces scp to use protocol 1. 26 27 -2 Forces scp to use protocol 2. 28 29 -4 Forces scp to use IPv4 addresses only. 30 31 -6 Forces scp to use IPv6 addresses only. 32 | 20 names containing `:' as host specifiers. Copies between two remote hosts 21 are also permitted. 22 23 The options are as follows: 24 25 -1 Forces scp to use protocol 1. 26 27 -2 Forces scp to use protocol 2. 28 29 -4 Forces scp to use IPv4 addresses only. 30 31 -6 Forces scp to use IPv6 addresses only. 32 |
33 -B Selects batch mode (prevents asking for passwords or passphras- 34 es). | 33 -B Selects batch mode (prevents asking for passwords or 34 passphrases). |
35 | 35 |
36 -C Compression enable. Passes the -C flag to ssh(1) to enable com- 37 pression. | 36 -C Compression enable. Passes the -C flag to ssh(1) to enable 37 compression. |
38 39 -c cipher 40 Selects the cipher to use for encrypting the data transfer. This 41 option is directly passed to ssh(1). 42 43 -F ssh_config 44 Specifies an alternative per-user configuration file for ssh. 45 This option is directly passed to ssh(1). --- 69 unchanged lines hidden (view full) --- 115 rcp(1). 116 117 -p Preserves modification times, access times, and modes from the 118 original file. 119 120 -q Quiet mode: disables the progress meter as well as warning and 121 diagnostic messages from ssh(1). 122 | 38 39 -c cipher 40 Selects the cipher to use for encrypting the data transfer. This 41 option is directly passed to ssh(1). 42 43 -F ssh_config 44 Specifies an alternative per-user configuration file for ssh. 45 This option is directly passed to ssh(1). --- 69 unchanged lines hidden (view full) --- 115 rcp(1). 116 117 -p Preserves modification times, access times, and modes from the 118 original file. 119 120 -q Quiet mode: disables the progress meter as well as warning and 121 diagnostic messages from ssh(1). 122 |
123 -r Recursively copy entire directories. Note that scp follows sym- 124 bolic links encountered in the tree traversal. | 123 -r Recursively copy entire directories. Note that scp follows 124 symbolic links encountered in the tree traversal. |
125 126 -S program 127 Name of program to use for the encrypted connection. The program 128 must understand ssh(1) options. 129 130 -v Verbose mode. Causes scp and ssh(1) to print debugging messages 131 about their progress. This is helpful in debugging connection, 132 authentication, and configuration problems. --- 7 unchanged lines hidden (view full) --- 140HISTORY 141 scp is based on the rcp(1) program in BSD source code from the Regents of 142 the University of California. 143 144AUTHORS 145 Timo Rinne <tri@iki.fi> 146 Tatu Ylonen <ylo@cs.hut.fi> 147 | 125 126 -S program 127 Name of program to use for the encrypted connection. The program 128 must understand ssh(1) options. 129 130 -v Verbose mode. Causes scp and ssh(1) to print debugging messages 131 about their progress. This is helpful in debugging connection, 132 authentication, and configuration problems. --- 7 unchanged lines hidden (view full) --- 140HISTORY 141 scp is based on the rcp(1) program in BSD source code from the Regents of 142 the University of California. 143 144AUTHORS 145 Timo Rinne <tri@iki.fi> 146 Tatu Ylonen <ylo@cs.hut.fi> 147 |
148OpenBSD 4.7 February 8, 2010 3 | 148OpenBSD 4.8 February 8, 2010 OpenBSD 4.8 |