diff options
author | Colin Watson <cjwatson@debian.org> | 2004-05-01 11:28:49 +0000 |
---|---|---|
committer | Colin Watson <cjwatson@debian.org> | 2004-05-01 11:28:49 +0000 |
commit | 16f1d21ea191deaaeeba719d01c0ad82aa044653 (patch) | |
tree | 0e52caec9e5c0e1ad3494e62bd1bc1b776a738a0 /scp.0 | |
parent | bd5f26f25dbbb93a9f9d3850c200a17a753ceee1 (diff) | |
parent | f5bda272678ec6dccaa5f29379cf60cb855018e8 (diff) |
Import OpenSSH 3.8.1p1.
Diffstat (limited to 'scp.0')
-rw-r--r-- | scp.0 | 139 |
1 files changed, 139 insertions, 0 deletions
@@ -0,0 +1,139 @@ | |||
1 | SCP(1) OpenBSD Reference Manual SCP(1) | ||
2 | |||
3 | NAME | ||
4 | scp - secure copy (remote file copy program) | ||
5 | |||
6 | SYNOPSIS | ||
7 | scp [-1246BCpqrv] [-c cipher] [-F ssh_config] [-i identity_file] | ||
8 | [-l limit] [-o ssh_option] [-P port] [-S program] | ||
9 | [[user@]host1:]file1 [...] [[user@]host2:]file2 | ||
10 | |||
11 | DESCRIPTION | ||
12 | scp copies files between hosts on a network. It uses ssh(1) for data | ||
13 | transfer, and uses the same authentication and provides the same security | ||
14 | as ssh(1). Unlike rcp(1), scp will ask for passwords or passphrases if | ||
15 | they are needed for authentication. | ||
16 | |||
17 | Any file name may contain a host and user specification to indicate that | ||
18 | the file is to be copied to/from that host. Copies between two remote | ||
19 | hosts are permitted. | ||
20 | |||
21 | The options are as follows: | ||
22 | |||
23 | -1 Forces scp to use protocol 1. | ||
24 | |||
25 | -2 Forces scp to use protocol 2. | ||
26 | |||
27 | -4 Forces scp to use IPv4 addresses only. | ||
28 | |||
29 | -6 Forces scp to use IPv6 addresses only. | ||
30 | |||
31 | -B Selects batch mode (prevents asking for passwords or passphras- | ||
32 | es). | ||
33 | |||
34 | -C Compression enable. Passes the -C flag to ssh(1) to enable com- | ||
35 | pression. | ||
36 | |||
37 | -c cipher | ||
38 | Selects the cipher to use for encrypting the data transfer. This | ||
39 | option is directly passed to ssh(1). | ||
40 | |||
41 | -F ssh_config | ||
42 | Specifies an alternative per-user configuration file for ssh. | ||
43 | This option is directly passed to ssh(1). | ||
44 | |||
45 | -i identity_file | ||
46 | Selects the file from which the identity (private key) for RSA | ||
47 | authentication is read. This option is directly passed to | ||
48 | ssh(1). | ||
49 | |||
50 | -l limit | ||
51 | Limits the used bandwidth, specified in Kbit/s. | ||
52 | |||
53 | -o ssh_option | ||
54 | Can be used to pass options to ssh in the format used in | ||
55 | ssh_config(5). This is useful for specifying options for which | ||
56 | there is no separate scp command-line flag. For full details of | ||
57 | the options listed below, and their possible values, see | ||
58 | ssh_config(5). | ||
59 | |||
60 | AddressFamily | ||
61 | BatchMode | ||
62 | BindAddress | ||
63 | ChallengeResponseAuthentication | ||
64 | CheckHostIP | ||
65 | Cipher | ||
66 | Ciphers | ||
67 | Compression | ||
68 | CompressionLevel | ||
69 | ConnectionAttempts | ||
70 | ConnectionTimeout | ||
71 | GlobalKnownHostsFile | ||
72 | GSSAPIAuthentication | ||
73 | GSSAPIDelegateCredentials | ||
74 | Host | ||
75 | HostbasedAuthentication | ||
76 | HostKeyAlgorithms | ||
77 | HostKeyAlias | ||
78 | HostName | ||
79 | IdentityFile | ||
80 | IdentitiesOnly | ||
81 | LogLevel | ||
82 | MACs | ||
83 | NoHostAuthenticationForLocalhost | ||
84 | NumberOfPasswordPrompts | ||
85 | PasswordAuthentication | ||
86 | Port | ||
87 | PreferredAuthentications | ||
88 | Protocol | ||
89 | ProxyCommand | ||
90 | PubkeyAuthentication | ||
91 | RhostsRSAAuthentication | ||
92 | RSAAuthentication | ||
93 | ServerAliveInterval | ||
94 | ServerAliveCountMax | ||
95 | SmartcardDevice | ||
96 | StrictHostKeyChecking | ||
97 | TCPKeepAlive | ||
98 | UsePrivilegedPort | ||
99 | User | ||
100 | UserKnownHostsFile | ||
101 | VerifyHostKeyDNS | ||
102 | |||
103 | -P port | ||
104 | Specifies the port to connect to on the remote host. Note that | ||
105 | this option is written with a capital `P', because -p is already | ||
106 | reserved for preserving the times and modes of the file in | ||
107 | rcp(1). | ||
108 | |||
109 | -p Preserves modification times, access times, and modes from the | ||
110 | original file. | ||
111 | |||
112 | -q Disables the progress meter. | ||
113 | |||
114 | -r Recursively copy entire directories. | ||
115 | |||
116 | -S program | ||
117 | Name of program to use for the encrypted connection. The program | ||
118 | must understand ssh(1) options. | ||
119 | |||
120 | -v Verbose mode. Causes scp and ssh(1) to print debugging messages | ||
121 | about their progress. This is helpful in debugging connection, | ||
122 | authentication, and configuration problems. | ||
123 | |||
124 | DIAGNOSTICS | ||
125 | scp exits with 0 on success or >0 if an error occurred. | ||
126 | |||
127 | SEE ALSO | ||
128 | rcp(1), sftp(1), ssh(1), ssh-add(1), ssh-agent(1), ssh-keygen(1), | ||
129 | ssh_config(5), sshd(8) | ||
130 | |||
131 | HISTORY | ||
132 | scp is based on the rcp(1) program in BSD source code from the Regents of | ||
133 | the University of California. | ||
134 | |||
135 | AUTHORS | ||
136 | Timo Rinne <tri@iki.fi> | ||
137 | Tatu Ylonen <ylo@cs.hut.fi> | ||
138 | |||
139 | OpenBSD 3.5 September 25, 1999 3 | ||