| .\" |
| .\" scp.1 |
| .\" |
| .\" Author: Tatu Ylonen <ylo@cs.hut.fi> |
| .\" |
| .\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland |
| .\" All rights reserved |
| .\" |
| .\" Created: Sun May 7 00:14:37 1995 ylo |
| .\" |
| .\" $OpenBSD: scp.1,v 1.60 2013/08/14 08:39:27 jmc Exp $ |
| .\" |
| .Dd $Mdocdate: August 14 2013 $ |
| .Dt SCP 1 |
| .Os |
| .Sh NAME |
| .Nm scp |
| .Nd secure copy (remote file copy program) |
| .Sh SYNOPSIS |
| .Nm scp |
| .Bk -words |
| .Op Fl 12346BCpqrv |
| .Op Fl c Ar cipher |
| .Op Fl F Ar ssh_config |
| .Op Fl i Ar identity_file |
| .Op Fl l Ar limit |
| .Op Fl o Ar ssh_option |
| .Op Fl P Ar port |
| .Op Fl S Ar program |
| .Sm off |
| .Oo |
| .Op Ar user No @ |
| .Ar host1 No : |
| .Oc Ar file1 |
| .Sm on |
| .Ar ... |
| .Sm off |
| .Oo |
| .Op Ar user No @ |
| .Ar host2 No : |
| .Oc Ar file2 |
| .Sm on |
| .Ek |
| .Sh DESCRIPTION |
| .Nm |
| copies files between hosts on a network. |
| It uses |
| .Xr ssh 1 |
| for data transfer, and uses the same authentication and provides the |
| same security as |
| .Xr ssh 1 . |
| Unlike |
| .Xr rcp 1 , |
| .Nm |
| will ask for passwords or passphrases if they are needed for |
| authentication. |
| .Pp |
| File names may contain a user and host specification to indicate |
| that the file is to be copied to/from that host. |
| Local file names can be made explicit using absolute or relative pathnames |
| to avoid |
| .Nm |
| treating file names containing |
| .Sq :\& |
| as host specifiers. |
| Copies between two remote hosts are also permitted. |
| .Pp |
| The options are as follows: |
| .Bl -tag -width Ds |
| .It Fl 1 |
| Forces |
| .Nm |
| to use protocol 1. |
| .It Fl 2 |
| Forces |
| .Nm |
| to use protocol 2. |
| .It Fl 3 |
| Copies between two remote hosts are transferred through the local host. |
| Without this option the data is copied directly between the two remote |
| hosts. |
| Note that this option disables the progress meter. |
| .It Fl 4 |
| Forces |
| .Nm |
| to use IPv4 addresses only. |
| .It Fl 6 |
| Forces |
| .Nm |
| to use IPv6 addresses only. |
| .It Fl B |
| Selects batch mode (prevents asking for passwords or passphrases). |
| .It Fl C |
| Compression enable. |
| Passes the |
| .Fl C |
| flag to |
| .Xr ssh 1 |
| to enable compression. |
| .It Fl c Ar cipher |
| Selects the cipher to use for encrypting the data transfer. |
| This option is directly passed to |
| .Xr ssh 1 . |
| .It Fl F Ar ssh_config |
| Specifies an alternative |
| per-user configuration file for |
| .Nm ssh . |
| This option is directly passed to |
| .Xr ssh 1 . |
| .It Fl i Ar identity_file |
| Selects the file from which the identity (private key) for public key |
| authentication is read. |
| This option is directly passed to |
| .Xr ssh 1 . |
| .It Fl l Ar limit |
| Limits the used bandwidth, specified in Kbit/s. |
| .It Fl o Ar ssh_option |
| Can be used to pass options to |
| .Nm ssh |
| in the format used in |
| .Xr ssh_config 5 . |
| This is useful for specifying options |
| for which there is no separate |
| .Nm scp |
| command-line flag. |
| For full details of the options listed below, and their possible values, see |
| .Xr ssh_config 5 . |
| .Pp |
| .Bl -tag -width Ds -offset indent -compact |
| .It AddressFamily |
| .It BatchMode |
| .It BindAddress |
| .It ChallengeResponseAuthentication |
| .It CheckHostIP |
| .It Cipher |
| .It Ciphers |
| .It Compression |
| .It CompressionLevel |
| .It ConnectionAttempts |
| .It ConnectTimeout |
| .It ControlMaster |
| .It ControlPath |
| .It ControlPersist |
| .It GlobalKnownHostsFile |
| .It GSSAPIAuthentication |
| .It GSSAPIDelegateCredentials |
| .It HashKnownHosts |
| .It Host |
| .It HostbasedAuthentication |
| .It HostKeyAlgorithms |
| .It HostKeyAlias |
| .It HostName |
| .It IdentityFile |
| .It IdentitiesOnly |
| .It IPQoS |
| .It KbdInteractiveAuthentication |
| .It KbdInteractiveDevices |
| .It KexAlgorithms |
| .It LogLevel |
| .It MACs |
| .It NoHostAuthenticationForLocalhost |
| .It NumberOfPasswordPrompts |
| .It PasswordAuthentication |
| .It PKCS11Provider |
| .It Port |
| .It PreferredAuthentications |
| .It Protocol |
| .It ProxyCommand |
| .It PubkeyAuthentication |
| .It RekeyLimit |
| .It RhostsRSAAuthentication |
| .It RSAAuthentication |
| .It SendEnv |
| .It ServerAliveInterval |
| .It ServerAliveCountMax |
| .It StrictHostKeyChecking |
| .It TCPKeepAlive |
| .It UsePrivilegedPort |
| .It User |
| .It UserKnownHostsFile |
| .It VerifyHostKeyDNS |
| .El |
| .It Fl P Ar port |
| Specifies the port to connect to on the remote host. |
| Note that this option is written with a capital |
| .Sq P , |
| because |
| .Fl p |
| is already reserved for preserving the times and modes of the file in |
| .Xr rcp 1 . |
| .It Fl p |
| Preserves modification times, access times, and modes from the |
| original file. |
| .It Fl q |
| Quiet mode: disables the progress meter as well as warning and diagnostic |
| messages from |
| .Xr ssh 1 . |
| .It Fl r |
| Recursively copy entire directories. |
| Note that |
| .Nm |
| follows symbolic links encountered in the tree traversal. |
| .It Fl S Ar program |
| Name of |
| .Ar program |
| to use for the encrypted connection. |
| The program must understand |
| .Xr ssh 1 |
| options. |
| .It Fl v |
| Verbose mode. |
| Causes |
| .Nm |
| and |
| .Xr ssh 1 |
| to print debugging messages about their progress. |
| This is helpful in |
| debugging connection, authentication, and configuration problems. |
| .El |
| .Sh EXIT STATUS |
| .Ex -std scp |
| .Sh SEE ALSO |
| .Xr rcp 1 , |
| .Xr sftp 1 , |
| .Xr ssh 1 , |
| .Xr ssh-add 1 , |
| .Xr ssh-agent 1 , |
| .Xr ssh-keygen 1 , |
| .Xr ssh_config 5 , |
| .Xr sshd 8 |
| .Sh HISTORY |
| .Nm |
| is based on the |
| .Xr rcp 1 |
| program in |
| .Bx |
| source code from the Regents of the University of California. |
| .Sh AUTHORS |
| .An Timo Rinne Aq Mt tri@iki.fi |
| .An Tatu Ylonen Aq Mt ylo@cs.hut.fi |