1SCP(1) OpenBSD Reference Manual SCP(1) 2 3NAME 4 scp - secure copy (remote file copy program) 5 6SYNOPSIS 7 scp [-12346BCpqrv] [-c cipher] [-F ssh_config] [-i identity_file] 8 [-l limit] [-o ssh_option] [-P port] [-S program] 9 [[user@]host1:]file1 ... [[user@]host2:]file2 10 11DESCRIPTION 12 scp copies files between hosts on a network. It uses ssh(1) for data 13 transfer, and uses the same authentication and provides the same security 14 as ssh(1). Unlike rcp(1), scp will ask for passwords or passphrases if 15 they are needed for authentication. 16 17 File names may contain a user and host specification to indicate that the 18 file is to be copied to/from that host. Local file names can be made 19 explicit using absolute or relative pathnames to avoid scp treating file 20 names containing `:' as host specifiers. Copies between two remote hosts 21 are also permitted. 22 23 The options are as follows: 24 25 -1 Forces scp to use protocol 1. 26 27 -2 Forces scp to use protocol 2. 28 29 -3 Copies between two remote hosts are transferred through the local 30 host. Without this option the data is copied directly between 31 the two remote hosts. Note that this option disables the 32 progress meter. 33 34 -4 Forces scp to use IPv4 addresses only. 35 36 -6 Forces scp to use IPv6 addresses only. 37 38 -B Selects batch mode (prevents asking for passwords or 39 passphrases). 40 41 -C Compression enable. Passes the -C flag to ssh(1) to enable 42 compression. 43 44 -c cipher 45 Selects the cipher to use for encrypting the data transfer. This 46 option is directly passed to ssh(1). 47 48 -F ssh_config 49 Specifies an alternative per-user configuration file for ssh. 50 This option is directly passed to ssh(1). 51 52 -i identity_file 53 Selects the file from which the identity (private key) for public 54 key authentication is read. This option is directly passed to 55 ssh(1). 56 57 -l limit 58 Limits the used bandwidth, specified in Kbit/s. 59 60 -o ssh_option 61 Can be used to pass options to ssh in the format used in 62 ssh_config(5). This is useful for specifying options for which 63 there is no separate scp command-line flag. For full details of 64 the options listed below, and their possible values, see 65 ssh_config(5). 66 67 AddressFamily 68 BatchMode 69 BindAddress 70 CanonicalDomains 71 CanonicalizeFallbackLocal 72 CanonicalizeHostname 73 CanonicalizeMaxDots 74 CanonicalizePermittedCNAMEs 75 ChallengeResponseAuthentication 76 CheckHostIP 77 Cipher 78 Ciphers 79 Compression 80 CompressionLevel 81 ConnectionAttempts 82 ConnectTimeout 83 ControlMaster 84 ControlPath 85 ControlPersist 86 GlobalKnownHostsFile 87 GSSAPIAuthentication 88 GSSAPIDelegateCredentials 89 HashKnownHosts 90 Host 91 HostbasedAuthentication 92 HostKeyAlgorithms 93 HostKeyAlias 94 HostName 95 IdentityFile 96 IdentitiesOnly 97 IPQoS 98 KbdInteractiveAuthentication 99 KbdInteractiveDevices 100 KexAlgorithms 101 LogLevel 102 MACs 103 NoHostAuthenticationForLocalhost 104 NumberOfPasswordPrompts 105 PasswordAuthentication 106 PKCS11Provider 107 Port 108 PreferredAuthentications 109 Protocol 110 ProxyCommand 111 PubkeyAuthentication 112 RekeyLimit 113 RhostsRSAAuthentication 114 RSAAuthentication 115 SendEnv 116 ServerAliveInterval 117 ServerAliveCountMax 118 StrictHostKeyChecking 119 TCPKeepAlive 120 UsePrivilegedPort 121 User 122 UserKnownHostsFile 123 VerifyHostKeyDNS 124 125 -P port 126 Specifies the port to connect to on the remote host. Note that 127 this option is written with a capital `P', because -p is already 128 reserved for preserving the times and modes of the file in 129 rcp(1). 130 131 -p Preserves modification times, access times, and modes from the 132 original file. 133 134 -q Quiet mode: disables the progress meter as well as warning and 135 diagnostic messages from ssh(1). 136 137 -r Recursively copy entire directories. Note that scp follows 138 symbolic links encountered in the tree traversal. 139 140 -S program 141 Name of program to use for the encrypted connection. The program 142 must understand ssh(1) options. 143 144 -v Verbose mode. Causes scp and ssh(1) to print debugging messages 145 about their progress. This is helpful in debugging connection, 146 authentication, and configuration problems. 147 148EXIT STATUS 149 The scp utility exits 0 on success, and >0 if an error occurs. 150 151SEE ALSO 152 rcp(1), sftp(1), ssh(1), ssh-add(1), ssh-agent(1), ssh-keygen(1), 153 ssh_config(5), sshd(8) 154 155HISTORY 156 scp is based on the rcp(1) program in BSD source code from the Regents of 157 the University of California. 158 159AUTHORS 160 Timo Rinne <tri@iki.fi> 161 Tatu Ylonen <ylo@cs.hut.fi> 162 163OpenBSD 5.5 October 20, 2013 OpenBSD 5.5 164