scp.1 revision 183458
-*- nroff -*-

scp.1

Author: Tatu Ylonen <ylo@cs.hut.fi>

Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
All rights reserved

Created: Sun May 7 00:14:37 1995 ylo

$OpenBSD: scp.1,v 1.46 2008/07/12 05:33:41 djm Exp $

.Dd July 12 2008 .Dt SCP 1 .Os .Sh NAME .Nm scp .Nd secure copy (remote file copy program) .Sh SYNOPSIS .Nm scp k -words .Op Fl 1246BCpqrv .Op Fl c Ar cipher .Op Fl F Ar ssh_config .Op Fl i Ar identity_file .Op Fl l Ar limit .Op Fl o Ar ssh_option .Op Fl P Ar port .Op Fl S Ar program .Sm off .Oo .Op Ar user No @ .Ar host1 No : .Oc Ns Ar file1 .Sm on .Ar ... .Sm off .Oo .Op Ar user No @ .Ar host2 No : .Oc Ar file2 .Sm on .Ek .Sh DESCRIPTION .Nm copies files between hosts on a network. It uses .Xr ssh 1 for data transfer, and uses the same authentication and provides the same security as .Xr ssh 1 . Unlike .Xr rcp 1 , .Nm will ask for passwords or passphrases if they are needed for authentication.

p File names may contain a user and host specification to indicate that the file is to be copied to/from that host. Local file names can be made explicit using absolute or relative pathnames to avoid .Nm treating file names containing .Sq :\& as host specifiers. Copies between two remote hosts are also permitted.

p The options are as follows: l -tag -width Ds t Fl 1 Forces .Nm to use protocol 1. t Fl 2 Forces .Nm to use protocol 2. t Fl 4 Forces .Nm to use IPv4 addresses only. t Fl 6 Forces .Nm to use IPv6 addresses only. t Fl B Selects batch mode (prevents asking for passwords or passphrases). t Fl C Compression enable. Passes the .Fl C flag to .Xr ssh 1 to enable compression. t Fl c Ar cipher Selects the cipher to use for encrypting the data transfer. This option is directly passed to .Xr ssh 1 . t Fl F Ar ssh_config Specifies an alternative per-user configuration file for .Nm ssh . This option is directly passed to .Xr ssh 1 . t Fl i Ar identity_file Selects the file from which the identity (private key) for public key authentication is read. This option is directly passed to .Xr ssh 1 . t Fl l Ar limit Limits the used bandwidth, specified in Kbit/s. t Fl o Ar ssh_option Can be used to pass options to .Nm ssh in the format used in .Xr ssh_config 5 . This is useful for specifying options for which there is no separate .Nm scp command-line flag. For full details of the options listed below, and their possible values, see .Xr ssh_config 5 .

p l -tag -width Ds -offset indent -compact t AddressFamily t BatchMode t BindAddress t ChallengeResponseAuthentication t CheckHostIP t Cipher t Ciphers t Compression t CompressionLevel t ConnectionAttempts t ConnectTimeout t ControlMaster t ControlPath t GlobalKnownHostsFile t GSSAPIAuthentication t GSSAPIDelegateCredentials t HashKnownHosts t Host t HostbasedAuthentication t HostKeyAlgorithms t HostKeyAlias t HostName t IdentityFile t IdentitiesOnly t KbdInteractiveDevices t LogLevel t MACs t NoHostAuthenticationForLocalhost t NumberOfPasswordPrompts t PasswordAuthentication t Port t PreferredAuthentications t Protocol t ProxyCommand t PubkeyAuthentication t RekeyLimit t RhostsRSAAuthentication t RSAAuthentication t SendEnv t ServerAliveInterval t ServerAliveCountMax t SmartcardDevice t StrictHostKeyChecking t TCPKeepAlive t UsePrivilegedPort t User t UserKnownHostsFile t VerifyHostKeyDNS .El t Fl P Ar port Specifies the port to connect to on the remote host. Note that this option is written with a capital .Sq P , because .Fl p is already reserved for preserving the times and modes of the file in .Xr rcp 1 . t Fl p Preserves modification times, access times, and modes from the original file. t Fl q Quiet mode: disables the progress meter as well as warning and diagnostic messages from .Xr ssh 1 . t Fl r Recursively copy entire directories. Note that .Nm follows symbolic links encountered in the tree traversal. t Fl S Ar program Name of .Ar program to use for the encrypted connection. The program must understand .Xr ssh 1 options. t Fl v Verbose mode. Causes .Nm and .Xr ssh 1 to print debugging messages about their progress. This is helpful in debugging connection, authentication, and configuration problems. .El

p .Ex -std scp .Sh SEE ALSO .Xr rcp 1 , .Xr sftp 1 , .Xr ssh 1 , .Xr ssh-add 1 , .Xr ssh-agent 1 , .Xr ssh-keygen 1 , .Xr ssh_config 5 , .Xr sshd 8 .Sh HISTORY .Nm is based on the .Xr rcp 1 program in BSD source code from the Regents of the University of California. .Sh AUTHORS .An Timo Rinne Aq tri@iki.fi .An Tatu Ylonen Aq ylo@cs.hut.fi