summaryrefslogtreecommitdiff
path: root/scp.0
diff options
context:
space:
mode:
authorColin Watson <cjwatson@debian.org>2010-03-31 00:43:52 +0100
committerColin Watson <cjwatson@debian.org>2010-03-31 00:43:52 +0100
commit004a7fb9c6a00b13dc98f56599918a54a3506d10 (patch)
treec8cb70b404e798f78982f06cd892ab82ecb1e03e /scp.0
parentd13d995a202c562c80d7e7a11c43504c505481d1 (diff)
parent1e4cfeee6c17b02af09418c5afe4a4d71aaaf0c8 (diff)
Import 5.4p1 tarball
Diffstat (limited to 'scp.0')
-rw-r--r--scp.0148
1 files changed, 148 insertions, 0 deletions
diff --git a/scp.0 b/scp.0
new file mode 100644
index 000000000..74dcf81da
--- /dev/null
+++ b/scp.0
@@ -0,0 +1,148 @@
1SCP(1) OpenBSD Reference Manual SCP(1)
2
3NAME
4 scp - secure copy (remote file copy program)
5
6SYNOPSIS
7 scp [-1246BCpqrv] [-c cipher] [-F ssh_config] [-i identity_file]
8 [-l limit] [-o ssh_option] [-P port] [-S program]
9 [[user@]host1:]file1 ... [[user@]host2:]file2
10
11DESCRIPTION
12 scp copies files between hosts on a network. It uses ssh(1) for data
13 transfer, and uses the same authentication and provides the same security
14 as ssh(1). Unlike rcp(1), scp will ask for passwords or passphrases if
15 they are needed for authentication.
16
17 File names may contain a user and host specification to indicate that the
18 file is to be copied to/from that host. Local file names can be made ex-
19 plicit using absolute or relative pathnames to avoid scp treating file
20 names containing `:' as host specifiers. Copies between two remote hosts
21 are also permitted.
22
23 The options are as follows:
24
25 -1 Forces scp to use protocol 1.
26
27 -2 Forces scp to use protocol 2.
28
29 -4 Forces scp to use IPv4 addresses only.
30
31 -6 Forces scp to use IPv6 addresses only.
32
33 -B Selects batch mode (prevents asking for passwords or passphras-
34 es).
35
36 -C Compression enable. Passes the -C flag to ssh(1) to enable com-
37 pression.
38
39 -c cipher
40 Selects the cipher to use for encrypting the data transfer. This
41 option is directly passed to ssh(1).
42
43 -F ssh_config
44 Specifies an alternative per-user configuration file for ssh.
45 This option is directly passed to ssh(1).
46
47 -i identity_file
48 Selects the file from which the identity (private key) for public
49 key authentication is read. This option is directly passed to
50 ssh(1).
51
52 -l limit
53 Limits the used bandwidth, specified in Kbit/s.
54
55 -o ssh_option
56 Can be used to pass options to ssh in the format used in
57 ssh_config(5). This is useful for specifying options for which
58 there is no separate scp command-line flag. For full details of
59 the options listed below, and their possible values, see
60 ssh_config(5).
61
62 AddressFamily
63 BatchMode
64 BindAddress
65 ChallengeResponseAuthentication
66 CheckHostIP
67 Cipher
68 Ciphers
69 Compression
70 CompressionLevel
71 ConnectionAttempts
72 ConnectTimeout
73 ControlMaster
74 ControlPath
75 GlobalKnownHostsFile
76 GSSAPIAuthentication
77 GSSAPIDelegateCredentials
78 HashKnownHosts
79 Host
80 HostbasedAuthentication
81 HostKeyAlgorithms
82 HostKeyAlias
83 HostName
84 IdentityFile
85 IdentitiesOnly
86 KbdInteractiveDevices
87 LogLevel
88 MACs
89 NoHostAuthenticationForLocalhost
90 NumberOfPasswordPrompts
91 PasswordAuthentication
92 PKCS11Provider
93 Port
94 PreferredAuthentications
95 Protocol
96 ProxyCommand
97 PubkeyAuthentication
98 RekeyLimit
99 RhostsRSAAuthentication
100 RSAAuthentication
101 SendEnv
102 ServerAliveInterval
103 ServerAliveCountMax
104 StrictHostKeyChecking
105 TCPKeepAlive
106 UsePrivilegedPort
107 User
108 UserKnownHostsFile
109 VerifyHostKeyDNS
110
111 -P port
112 Specifies the port to connect to on the remote host. Note that
113 this option is written with a capital `P', because -p is already
114 reserved for preserving the times and modes of the file in
115 rcp(1).
116
117 -p Preserves modification times, access times, and modes from the
118 original file.
119
120 -q Quiet mode: disables the progress meter as well as warning and
121 diagnostic messages from ssh(1).
122
123 -r Recursively copy entire directories. Note that scp follows sym-
124 bolic links encountered in the tree traversal.
125
126 -S program
127 Name of program to use for the encrypted connection. The program
128 must understand ssh(1) options.
129
130 -v Verbose mode. Causes scp and ssh(1) to print debugging messages
131 about their progress. This is helpful in debugging connection,
132 authentication, and configuration problems.
133
134 The scp utility exits 0 on success, and >0 if an error occurs.
135
136SEE ALSO
137 rcp(1), sftp(1), ssh(1), ssh-add(1), ssh-agent(1), ssh-keygen(1),
138 ssh_config(5), sshd(8)
139
140HISTORY
141 scp is based on the rcp(1) program in BSD source code from the Regents of
142 the University of California.
143
144AUTHORS
145 Timo Rinne <tri@iki.fi>
146 Tatu Ylonen <ylo@cs.hut.fi>
147
148OpenBSD 4.6 February 8, 2010 3