]> andersk Git - gssapi-openssh.git/blame - openssh/scp.1
Merge from OPENSSH_3_8_1P1_GSSAPI_20040713 to OPENSSH_3_9P1_GSSAPI_20040818.
[gssapi-openssh.git] / openssh / scp.1
CommitLineData
3c0ef626 1.\" -*- nroff -*-
2.\"
3.\" scp.1
4.\"
5.\" Author: Tatu Ylonen <ylo@cs.hut.fi>
6.\"
7.\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
8.\" All rights reserved
9.\"
10.\" Created: Sun May 7 00:14:37 1995 ylo
11.\"
1b56ff3d 12.\" $OpenBSD: scp.1,v 1.36 2004/06/13 15:03:02 djm Exp $
3c0ef626 13.\"
14.Dd September 25, 1999
15.Dt SCP 1
16.Os
17.Sh NAME
18.Nm scp
19.Nd secure copy (remote file copy program)
20.Sh SYNOPSIS
21.Nm scp
1c14df9e 22.Bk -words
416fd2a8 23.Op Fl 1246BCpqrv
3c0ef626 24.Op Fl c Ar cipher
416fd2a8 25.Op Fl F Ar ssh_config
3c0ef626 26.Op Fl i Ar identity_file
1c14df9e 27.Op Fl l Ar limit
3c0ef626 28.Op Fl o Ar ssh_option
416fd2a8 29.Op Fl P Ar port
30.Op Fl S Ar program
3c0ef626 31.Sm off
32.Oo
416fd2a8 33.Op Ar user No @
3c0ef626 34.Ar host1 No :
35.Oc Ns Ar file1
36.Sm on
37.Op Ar ...
38.Sm off
39.Oo
416fd2a8 40.Op Ar user No @
3c0ef626 41.Ar host2 No :
42.Oc Ar file2
43.Sm on
1c14df9e 44.Ek
3c0ef626 45.Sh DESCRIPTION
46.Nm
47copies files between hosts on a network.
48It uses
49.Xr ssh 1
50for data transfer, and uses the same authentication and provides the
51same security as
52.Xr ssh 1 .
53Unlike
54.Xr rcp 1 ,
55.Nm
56will ask for passwords or passphrases if they are needed for
57authentication.
58.Pp
59Any file name may contain a host and user specification to indicate
60that the file is to be copied to/from that host.
61Copies between two remote hosts are permitted.
62.Pp
63The options are as follows:
64.Bl -tag -width Ds
416fd2a8 65.It Fl 1
66Forces
3c0ef626 67.Nm
416fd2a8 68to use protocol 1.
69.It Fl 2
70Forces
71.Nm
72to use protocol 2.
73.It Fl 4
74Forces
75.Nm
76to use IPv4 addresses only.
77.It Fl 6
78Forces
79.Nm
80to use IPv6 addresses only.
3c0ef626 81.It Fl B
82Selects batch mode (prevents asking for passwords or passphrases).
3c0ef626 83.It Fl C
84Compression enable.
85Passes the
86.Fl C
87flag to
88.Xr ssh 1
89to enable compression.
416fd2a8 90.It Fl c Ar cipher
91Selects the cipher to use for encrypting the data transfer.
92This option is directly passed to
93.Xr ssh 1 .
3c0ef626 94.It Fl F Ar ssh_config
95Specifies an alternative
96per-user configuration file for
97.Nm ssh .
98This option is directly passed to
99.Xr ssh 1 .
416fd2a8 100.It Fl i Ar identity_file
101Selects the file from which the identity (private key) for RSA
102authentication is read.
103This option is directly passed to
104.Xr ssh 1 .
105.It Fl l Ar limit
106Limits the used bandwidth, specified in Kbit/s.
107.It Fl o Ar ssh_option
108Can be used to pass options to
109.Nm ssh
110in the format used in
111.Xr ssh_config 5 .
112This is useful for specifying options
113for which there is no separate
114.Nm scp
115command-line flag.
116For full details of the options listed below, and their possible values, see
117.Xr ssh_config 5 .
118.Pp
119.Bl -tag -width Ds -offset indent -compact
120.It AddressFamily
121.It BatchMode
122.It BindAddress
123.It ChallengeResponseAuthentication
124.It CheckHostIP
125.It Cipher
126.It Ciphers
127.It Compression
128.It CompressionLevel
129.It ConnectionAttempts
1b56ff3d 130.It ConnectTimeout
131.It ControlMaster
132.It ControlPath
416fd2a8 133.It GlobalKnownHostsFile
134.It GSSAPIAuthentication
135.It GSSAPIDelegateCredentials
136.It Host
137.It HostbasedAuthentication
138.It HostKeyAlgorithms
139.It HostKeyAlias
140.It HostName
141.It IdentityFile
2a304a95 142.It IdentitiesOnly
416fd2a8 143.It LogLevel
144.It MACs
145.It NoHostAuthenticationForLocalhost
146.It NumberOfPasswordPrompts
147.It PasswordAuthentication
148.It Port
149.It PreferredAuthentications
150.It Protocol
151.It ProxyCommand
152.It PubkeyAuthentication
153.It RhostsRSAAuthentication
154.It RSAAuthentication
1b56ff3d 155.It SendEnv
416fd2a8 156.It ServerAliveInterval
157.It ServerAliveCountMax
158.It SmartcardDevice
159.It StrictHostKeyChecking
160.It TCPKeepAlive
161.It UsePrivilegedPort
162.It User
163.It UserKnownHostsFile
164.It VerifyHostKeyDNS
165.El
3c0ef626 166.It Fl P Ar port
167Specifies the port to connect to on the remote host.
168Note that this option is written with a capital
169.Sq P ,
170because
171.Fl p
172is already reserved for preserving the times and modes of the file in
173.Xr rcp 1 .
416fd2a8 174.It Fl p
175Preserves modification times, access times, and modes from the
176original file.
177.It Fl q
178Disables the progress meter.
179.It Fl r
180Recursively copy entire directories.
3c0ef626 181.It Fl S Ar program
182Name of
183.Ar program
184to use for the encrypted connection.
185The program must understand
186.Xr ssh 1
187options.
416fd2a8 188.It Fl v
189Verbose mode.
190Causes
3c0ef626 191.Nm
416fd2a8 192and
193.Xr ssh 1
194to print debugging messages about their progress.
195This is helpful in
196debugging connection, authentication, and configuration problems.
3c0ef626 197.El
e9a17296 198.Sh DIAGNOSTICS
199.Nm
200exits with 0 on success or >0 if an error occurred.
3c0ef626 201.Sh SEE ALSO
202.Xr rcp 1 ,
203.Xr sftp 1 ,
204.Xr ssh 1 ,
205.Xr ssh-add 1 ,
206.Xr ssh-agent 1 ,
207.Xr ssh-keygen 1 ,
ff2d7a98 208.Xr ssh_config 5 ,
3c0ef626 209.Xr sshd 8
70791e56 210.Sh HISTORY
211.Nm
212is based on the
213.Xr rcp 1
214program in BSD source code from the Regents of the University of
215California.
216.Sh AUTHORS
217.An Timo Rinne Aq tri@iki.fi
70791e56 218.An Tatu Ylonen Aq ylo@cs.hut.fi
This page took 0.08879 seconds and 5 git commands to generate.