]> andersk Git - gssapi-openssh.git/blame - openssh/scp.1
Import of OpenSSH 4.7p1
[gssapi-openssh.git] / openssh / scp.1
CommitLineData
3c0ef626 1.\" -*- nroff -*-
2.\"
3.\" scp.1
4.\"
5.\" Author: Tatu Ylonen <ylo@cs.hut.fi>
6.\"
7.\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
8.\" All rights reserved
9.\"
10.\" Created: Sun May 7 00:14:37 1995 ylo
11.\"
d4487008 12.\" $OpenBSD: scp.1,v 1.42 2007/08/06 19:16:06 sobrado Exp $
3c0ef626 13.\"
d4487008 14.Dd $Mdocdate: August 8 2007 $
3c0ef626 15.Dt SCP 1
16.Os
17.Sh NAME
18.Nm scp
19.Nd secure copy (remote file copy program)
20.Sh SYNOPSIS
21.Nm scp
6a9b3198 22.Bk -words
cdd66111 23.Op Fl 1246BCpqrv
9cb1827b 24.Op Fl c Ar cipher
cdd66111 25.Op Fl F Ar ssh_config
3c0ef626 26.Op Fl i Ar identity_file
6a9b3198 27.Op Fl l Ar limit
3c0ef626 28.Op Fl o Ar ssh_option
cdd66111 29.Op Fl P Ar port
30.Op Fl S Ar program
3c0ef626 31.Sm off
32.Oo
cdd66111 33.Op Ar user No @
3c0ef626 34.Ar host1 No :
35.Oc Ns Ar file1
36.Sm on
d4487008 37.Ar ...
3c0ef626 38.Sm off
39.Oo
cdd66111 40.Op Ar user No @
3c0ef626 41.Ar host2 No :
42.Oc Ar file2
43.Sm on
6a9b3198 44.Ek
3c0ef626 45.Sh DESCRIPTION
46.Nm
47copies files between hosts on a network.
48It uses
49.Xr ssh 1
50for data transfer, and uses the same authentication and provides the
51same security as
52.Xr ssh 1 .
53Unlike
54.Xr rcp 1 ,
55.Nm
56will ask for passwords or passphrases if they are needed for
57authentication.
58.Pp
59Any file name may contain a host and user specification to indicate
60that the file is to be copied to/from that host.
61Copies between two remote hosts are permitted.
62.Pp
63The options are as follows:
64.Bl -tag -width Ds
cdd66111 65.It Fl 1
66Forces
12408a1b 67.Nm
cdd66111 68to use protocol 1.
69.It Fl 2
70Forces
71.Nm
72to use protocol 2.
73.It Fl 4
74Forces
75.Nm
76to use IPv4 addresses only.
77.It Fl 6
78Forces
79.Nm
80to use IPv6 addresses only.
3c0ef626 81.It Fl B
82Selects batch mode (prevents asking for passwords or passphrases).
3c0ef626 83.It Fl C
84Compression enable.
85Passes the
86.Fl C
87flag to
88.Xr ssh 1
89to enable compression.
cdd66111 90.It Fl c Ar cipher
91Selects the cipher to use for encrypting the data transfer.
92This option is directly passed to
93.Xr ssh 1 .
3c0ef626 94.It Fl F Ar ssh_config
95Specifies an alternative
96per-user configuration file for
97.Nm ssh .
98This option is directly passed to
99.Xr ssh 1 .
cdd66111 100.It Fl i Ar identity_file
101Selects the file from which the identity (private key) for RSA
102authentication is read.
103This option is directly passed to
104.Xr ssh 1 .
105.It Fl l Ar limit
106Limits the used bandwidth, specified in Kbit/s.
107.It Fl o Ar ssh_option
108Can be used to pass options to
109.Nm ssh
110in the format used in
111.Xr ssh_config 5 .
112This is useful for specifying options
113for which there is no separate
114.Nm scp
115command-line flag.
116For full details of the options listed below, and their possible values, see
117.Xr ssh_config 5 .
118.Pp
119.Bl -tag -width Ds -offset indent -compact
120.It AddressFamily
121.It BatchMode
122.It BindAddress
123.It ChallengeResponseAuthentication
124.It CheckHostIP
125.It Cipher
126.It Ciphers
127.It Compression
128.It CompressionLevel
129.It ConnectionAttempts
c9f39d2c 130.It ConnectTimeout
131.It ControlMaster
132.It ControlPath
cdd66111 133.It GlobalKnownHostsFile
134.It GSSAPIAuthentication
135.It GSSAPIDelegateCredentials
996d5e62 136.It HashKnownHosts
cdd66111 137.It Host
138.It HostbasedAuthentication
139.It HostKeyAlgorithms
140.It HostKeyAlias
141.It HostName
142.It IdentityFile
99be0775 143.It IdentitiesOnly
996d5e62 144.It KbdInteractiveDevices
cdd66111 145.It LogLevel
146.It MACs
147.It NoHostAuthenticationForLocalhost
148.It NumberOfPasswordPrompts
149.It PasswordAuthentication
150.It Port
151.It PreferredAuthentications
152.It Protocol
153.It ProxyCommand
154.It PubkeyAuthentication
2c06c99b 155.It RekeyLimit
cdd66111 156.It RhostsRSAAuthentication
157.It RSAAuthentication
c9f39d2c 158.It SendEnv
cdd66111 159.It ServerAliveInterval
160.It ServerAliveCountMax
161.It SmartcardDevice
162.It StrictHostKeyChecking
163.It TCPKeepAlive
164.It UsePrivilegedPort
165.It User
166.It UserKnownHostsFile
167.It VerifyHostKeyDNS
168.El
3c0ef626 169.It Fl P Ar port
170Specifies the port to connect to on the remote host.
171Note that this option is written with a capital
172.Sq P ,
173because
174.Fl p
175is already reserved for preserving the times and modes of the file in
176.Xr rcp 1 .
cdd66111 177.It Fl p
178Preserves modification times, access times, and modes from the
179original file.
180.It Fl q
181Disables the progress meter.
182.It Fl r
183Recursively copy entire directories.
3c0ef626 184.It Fl S Ar program
185Name of
186.Ar program
187to use for the encrypted connection.
188The program must understand
189.Xr ssh 1
190options.
cdd66111 191.It Fl v
192Verbose mode.
193Causes
9cb1827b 194.Nm
cdd66111 195and
196.Xr ssh 1
197to print debugging messages about their progress.
198This is helpful in
199debugging connection, authentication, and configuration problems.
3c0ef626 200.El
9108f8d9 201.Pp
202.Ex -std scp
3c0ef626 203.Sh SEE ALSO
204.Xr rcp 1 ,
205.Xr sftp 1 ,
206.Xr ssh 1 ,
207.Xr ssh-add 1 ,
208.Xr ssh-agent 1 ,
209.Xr ssh-keygen 1 ,
680cee3b 210.Xr ssh_config 5 ,
3c0ef626 211.Xr sshd 8
0fff78ff 212.Sh HISTORY
213.Nm
214is based on the
215.Xr rcp 1
216program in BSD source code from the Regents of the University of
217California.
218.Sh AUTHORS
219.An Timo Rinne Aq tri@iki.fi
0fff78ff 220.An Tatu Ylonen Aq ylo@cs.hut.fi
This page took 0.858673 seconds and 5 git commands to generate.