summaryrefslogtreecommitdiff
path: root/scp.0
diff options
context:
space:
mode:
authorColin Watson <cjwatson@debian.org>2005-09-14 11:27:01 +0000
committerColin Watson <cjwatson@debian.org>2005-09-14 11:27:01 +0000
commit16704d57999d987fb8d9ba53379841a79f016d67 (patch)
treeb7ecfbd5be83f191af382f3186c39ba1843ba7a1 /scp.0
parentc8ab8ceacbe4dbdd7afea4e890d92e86282d050e (diff)
parenta55bd782aa819b7f5ae716de000f19f4f531850e (diff)
Import OpenSSH 4.2p1.
Diffstat (limited to 'scp.0')
-rw-r--r--scp.0144
1 files changed, 144 insertions, 0 deletions
diff --git a/scp.0 b/scp.0
new file mode 100644
index 000000000..aa54dda3f
--- /dev/null
+++ b/scp.0
@@ -0,0 +1,144 @@
1SCP(1) OpenBSD Reference Manual SCP(1)
2
3NAME
4 scp - secure copy (remote file copy program)
5
6SYNOPSIS
7 scp [-1246BCpqrv] [-c cipher] [-F ssh_config] [-i identity_file]
8 [-l limit] [-o ssh_option] [-P port] [-S program]
9 [[user@]host1:]file1 [...] [[user@]host2:]file2
10
11DESCRIPTION
12 scp copies files between hosts on a network. It uses ssh(1) for data
13 transfer, and uses the same authentication and provides the same security
14 as ssh(1). Unlike rcp(1), scp will ask for passwords or passphrases if
15 they are needed for authentication.
16
17 Any file name may contain a host and user specification to indicate that
18 the file is to be copied to/from that host. Copies between two remote
19 hosts are permitted.
20
21 The options are as follows:
22
23 -1 Forces scp to use protocol 1.
24
25 -2 Forces scp to use protocol 2.
26
27 -4 Forces scp to use IPv4 addresses only.
28
29 -6 Forces scp to use IPv6 addresses only.
30
31 -B Selects batch mode (prevents asking for passwords or passphras-
32 es).
33
34 -C Compression enable. Passes the -C flag to ssh(1) to enable com-
35 pression.
36
37 -c cipher
38 Selects the cipher to use for encrypting the data transfer. This
39 option is directly passed to ssh(1).
40
41 -F ssh_config
42 Specifies an alternative per-user configuration file for ssh.
43 This option is directly passed to ssh(1).
44
45 -i identity_file
46 Selects the file from which the identity (private key) for RSA
47 authentication is read. This option is directly passed to
48 ssh(1).
49
50 -l limit
51 Limits the used bandwidth, specified in Kbit/s.
52
53 -o ssh_option
54 Can be used to pass options to ssh in the format used in
55 ssh_config(5). This is useful for specifying options for which
56 there is no separate scp command-line flag. For full details of
57 the options listed below, and their possible values, see
58 ssh_config(5).
59
60 AddressFamily
61 BatchMode
62 BindAddress
63 ChallengeResponseAuthentication
64 CheckHostIP
65 Cipher
66 Ciphers
67 Compression
68 CompressionLevel
69 ConnectionAttempts
70 ConnectTimeout
71 ControlMaster
72 ControlPath
73 GlobalKnownHostsFile
74 GSSAPIAuthentication
75 GSSAPIDelegateCredentials
76 HashKnownHosts
77 Host
78 HostbasedAuthentication
79 HostKeyAlgorithms
80 HostKeyAlias
81 HostName
82 IdentityFile
83 IdentitiesOnly
84 KbdInteractiveDevices
85 LogLevel
86 MACs
87 NoHostAuthenticationForLocalhost
88 NumberOfPasswordPrompts
89 PasswordAuthentication
90 Port
91 PreferredAuthentications
92 Protocol
93 ProxyCommand
94 PubkeyAuthentication
95 RhostsRSAAuthentication
96 RSAAuthentication
97 SendEnv
98 ServerAliveInterval
99 ServerAliveCountMax
100 SmartcardDevice
101 StrictHostKeyChecking
102 TCPKeepAlive
103 UsePrivilegedPort
104 User
105 UserKnownHostsFile
106 VerifyHostKeyDNS
107
108 -P port
109 Specifies the port to connect to on the remote host. Note that
110 this option is written with a capital `P', because -p is already
111 reserved for preserving the times and modes of the file in
112 rcp(1).
113
114 -p Preserves modification times, access times, and modes from the
115 original file.
116
117 -q Disables the progress meter.
118
119 -r Recursively copy entire directories.
120
121 -S program
122 Name of program to use for the encrypted connection. The program
123 must understand ssh(1) options.
124
125 -v Verbose mode. Causes scp and ssh(1) to print debugging messages
126 about their progress. This is helpful in debugging connection,
127 authentication, and configuration problems.
128
129DIAGNOSTICS
130 scp exits with 0 on success or >0 if an error occurred.
131
132SEE ALSO
133 rcp(1), sftp(1), ssh(1), ssh-add(1), ssh-agent(1), ssh-keygen(1),
134 ssh_config(5), sshd(8)
135
136HISTORY
137 scp is based on the rcp(1) program in BSD source code from the Regents of
138 the University of California.
139
140AUTHORS
141 Timo Rinne <tri@iki.fi>
142 Tatu Ylonen <ylo@cs.hut.fi>
143
144OpenBSD 3.8 September 25, 1999 3