]>
Commit | Line | Data |
---|---|---|
3c0ef626 | 1 | .\" -*- nroff -*- |
2 | .\" | |
3 | .\" scp.1 | |
4 | .\" | |
5 | .\" Author: Tatu Ylonen <ylo@cs.hut.fi> | |
6 | .\" | |
7 | .\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland | |
8 | .\" All rights reserved | |
9 | .\" | |
10 | .\" Created: Sun May 7 00:14:37 1995 ylo | |
11 | .\" | |
47686178 | 12 | .\" $OpenBSD: scp.1,v 1.44 2008/01/31 20:06:50 jmc Exp $ |
3c0ef626 | 13 | .\" |
47686178 | 14 | .Dd $Mdocdate: February 10 2008 $ |
3c0ef626 | 15 | .Dt SCP 1 |
16 | .Os | |
17 | .Sh NAME | |
18 | .Nm scp | |
19 | .Nd secure copy (remote file copy program) | |
20 | .Sh SYNOPSIS | |
21 | .Nm scp | |
6a9b3198 | 22 | .Bk -words |
cdd66111 | 23 | .Op Fl 1246BCpqrv |
9cb1827b | 24 | .Op Fl c Ar cipher |
cdd66111 | 25 | .Op Fl F Ar ssh_config |
3c0ef626 | 26 | .Op Fl i Ar identity_file |
6a9b3198 | 27 | .Op Fl l Ar limit |
3c0ef626 | 28 | .Op Fl o Ar ssh_option |
cdd66111 | 29 | .Op Fl P Ar port |
30 | .Op Fl S Ar program | |
3c0ef626 | 31 | .Sm off |
32 | .Oo | |
cdd66111 | 33 | .Op Ar user No @ |
3c0ef626 | 34 | .Ar host1 No : |
35 | .Oc Ns Ar file1 | |
36 | .Sm on | |
d4487008 | 37 | .Ar ... |
3c0ef626 | 38 | .Sm off |
39 | .Oo | |
cdd66111 | 40 | .Op Ar user No @ |
3c0ef626 | 41 | .Ar host2 No : |
42 | .Oc Ar file2 | |
43 | .Sm on | |
6a9b3198 | 44 | .Ek |
3c0ef626 | 45 | .Sh DESCRIPTION |
46 | .Nm | |
47 | copies files between hosts on a network. | |
48 | It uses | |
49 | .Xr ssh 1 | |
50 | for data transfer, and uses the same authentication and provides the | |
51 | same security as | |
52 | .Xr ssh 1 . | |
53 | Unlike | |
54 | .Xr rcp 1 , | |
55 | .Nm | |
56 | will ask for passwords or passphrases if they are needed for | |
57 | authentication. | |
58 | .Pp | |
47686178 | 59 | File names may contain a user and host specification to indicate |
3c0ef626 | 60 | that the file is to be copied to/from that host. |
47686178 | 61 | Local file names can be made explicit using absolute or relative pathnames |
62 | to avoid | |
63 | .Nm | |
64 | treating file names containing | |
65 | .Sq :\& | |
66 | as host specifiers. | |
67 | Copies between two remote hosts are also permitted. | |
3c0ef626 | 68 | .Pp |
69 | The options are as follows: | |
70 | .Bl -tag -width Ds | |
cdd66111 | 71 | .It Fl 1 |
72 | Forces | |
12408a1b | 73 | .Nm |
cdd66111 | 74 | to use protocol 1. |
75 | .It Fl 2 | |
76 | Forces | |
77 | .Nm | |
78 | to use protocol 2. | |
79 | .It Fl 4 | |
80 | Forces | |
81 | .Nm | |
82 | to use IPv4 addresses only. | |
83 | .It Fl 6 | |
84 | Forces | |
85 | .Nm | |
86 | to use IPv6 addresses only. | |
3c0ef626 | 87 | .It Fl B |
88 | Selects batch mode (prevents asking for passwords or passphrases). | |
3c0ef626 | 89 | .It Fl C |
90 | Compression enable. | |
91 | Passes the | |
92 | .Fl C | |
93 | flag to | |
94 | .Xr ssh 1 | |
95 | to enable compression. | |
cdd66111 | 96 | .It Fl c Ar cipher |
97 | Selects the cipher to use for encrypting the data transfer. | |
98 | This option is directly passed to | |
99 | .Xr ssh 1 . | |
3c0ef626 | 100 | .It Fl F Ar ssh_config |
101 | Specifies an alternative | |
102 | per-user configuration file for | |
103 | .Nm ssh . | |
104 | This option is directly passed to | |
105 | .Xr ssh 1 . | |
cdd66111 | 106 | .It Fl i Ar identity_file |
107 | Selects the file from which the identity (private key) for RSA | |
108 | authentication is read. | |
109 | This option is directly passed to | |
110 | .Xr ssh 1 . | |
111 | .It Fl l Ar limit | |
112 | Limits the used bandwidth, specified in Kbit/s. | |
113 | .It Fl o Ar ssh_option | |
114 | Can be used to pass options to | |
115 | .Nm ssh | |
116 | in the format used in | |
117 | .Xr ssh_config 5 . | |
118 | This is useful for specifying options | |
119 | for which there is no separate | |
120 | .Nm scp | |
121 | command-line flag. | |
122 | For full details of the options listed below, and their possible values, see | |
123 | .Xr ssh_config 5 . | |
124 | .Pp | |
125 | .Bl -tag -width Ds -offset indent -compact | |
126 | .It AddressFamily | |
127 | .It BatchMode | |
128 | .It BindAddress | |
129 | .It ChallengeResponseAuthentication | |
130 | .It CheckHostIP | |
131 | .It Cipher | |
132 | .It Ciphers | |
133 | .It Compression | |
134 | .It CompressionLevel | |
135 | .It ConnectionAttempts | |
c9f39d2c | 136 | .It ConnectTimeout |
137 | .It ControlMaster | |
138 | .It ControlPath | |
cdd66111 | 139 | .It GlobalKnownHostsFile |
140 | .It GSSAPIAuthentication | |
141 | .It GSSAPIDelegateCredentials | |
996d5e62 | 142 | .It HashKnownHosts |
cdd66111 | 143 | .It Host |
144 | .It HostbasedAuthentication | |
145 | .It HostKeyAlgorithms | |
146 | .It HostKeyAlias | |
147 | .It HostName | |
148 | .It IdentityFile | |
99be0775 | 149 | .It IdentitiesOnly |
996d5e62 | 150 | .It KbdInteractiveDevices |
cdd66111 | 151 | .It LogLevel |
152 | .It MACs | |
153 | .It NoHostAuthenticationForLocalhost | |
154 | .It NumberOfPasswordPrompts | |
155 | .It PasswordAuthentication | |
156 | .It Port | |
157 | .It PreferredAuthentications | |
158 | .It Protocol | |
159 | .It ProxyCommand | |
160 | .It PubkeyAuthentication | |
2c06c99b | 161 | .It RekeyLimit |
cdd66111 | 162 | .It RhostsRSAAuthentication |
163 | .It RSAAuthentication | |
c9f39d2c | 164 | .It SendEnv |
cdd66111 | 165 | .It ServerAliveInterval |
166 | .It ServerAliveCountMax | |
167 | .It SmartcardDevice | |
168 | .It StrictHostKeyChecking | |
169 | .It TCPKeepAlive | |
170 | .It UsePrivilegedPort | |
171 | .It User | |
172 | .It UserKnownHostsFile | |
173 | .It VerifyHostKeyDNS | |
174 | .El | |
3c0ef626 | 175 | .It Fl P Ar port |
176 | Specifies the port to connect to on the remote host. | |
177 | Note that this option is written with a capital | |
178 | .Sq P , | |
179 | because | |
180 | .Fl p | |
181 | is already reserved for preserving the times and modes of the file in | |
182 | .Xr rcp 1 . | |
cdd66111 | 183 | .It Fl p |
184 | Preserves modification times, access times, and modes from the | |
185 | original file. | |
186 | .It Fl q | |
47686178 | 187 | Quiet mode: disables the progress meter as well as warning and diagnostic |
188 | messages from | |
189 | .Xr ssh 1 . | |
cdd66111 | 190 | .It Fl r |
191 | Recursively copy entire directories. | |
3c0ef626 | 192 | .It Fl S Ar program |
193 | Name of | |
194 | .Ar program | |
195 | to use for the encrypted connection. | |
196 | The program must understand | |
197 | .Xr ssh 1 | |
198 | options. | |
cdd66111 | 199 | .It Fl v |
200 | Verbose mode. | |
201 | Causes | |
9cb1827b | 202 | .Nm |
cdd66111 | 203 | and |
204 | .Xr ssh 1 | |
205 | to print debugging messages about their progress. | |
206 | This is helpful in | |
207 | debugging connection, authentication, and configuration problems. | |
3c0ef626 | 208 | .El |
9108f8d9 | 209 | .Pp |
210 | .Ex -std scp | |
3c0ef626 | 211 | .Sh SEE ALSO |
212 | .Xr rcp 1 , | |
213 | .Xr sftp 1 , | |
214 | .Xr ssh 1 , | |
215 | .Xr ssh-add 1 , | |
216 | .Xr ssh-agent 1 , | |
217 | .Xr ssh-keygen 1 , | |
680cee3b | 218 | .Xr ssh_config 5 , |
3c0ef626 | 219 | .Xr sshd 8 |
0fff78ff | 220 | .Sh HISTORY |
221 | .Nm | |
222 | is based on the | |
223 | .Xr rcp 1 | |
224 | program in BSD source code from the Regents of the University of | |
225 | California. | |
226 | .Sh AUTHORS | |
227 | .An Timo Rinne Aq tri@iki.fi | |
0fff78ff | 228 | .An Tatu Ylonen Aq ylo@cs.hut.fi |