diff options
author | Colin Watson <cjwatson@debian.org> | 2004-03-01 02:25:32 +0000 |
---|---|---|
committer | Colin Watson <cjwatson@debian.org> | 2004-03-01 02:25:32 +0000 |
commit | ea8116a11e3de70036dbc665ccb0d486cf89cac9 (patch) | |
tree | d73ccdff78d8608e156465af42e6a1b3527fb2d6 /scp.1 | |
parent | e39b311381a5609cc05acf298c42fba196dc524b (diff) | |
parent | f5bda272678ec6dccaa5f29379cf60cb855018e8 (diff) |
Merge 3.8p1 to the trunk. This builds and runs, but I haven't tested it
extensively yet.
ProtocolKeepAlives is now just a compatibility alias for
ServerAliveInterval.
Diffstat (limited to 'scp.1')
-rw-r--r-- | scp.1 | 161 |
1 files changed, 103 insertions, 58 deletions
@@ -9,7 +9,7 @@ | |||
9 | .\" | 9 | .\" |
10 | .\" Created: Sun May 7 00:14:37 1995 ylo | 10 | .\" Created: Sun May 7 00:14:37 1995 ylo |
11 | .\" | 11 | .\" |
12 | .\" $OpenBSD: scp.1,v 1.28 2003/06/10 09:12:11 jmc Exp $ | 12 | .\" $OpenBSD: scp.1,v 1.32 2003/12/16 15:49:51 markus Exp $ |
13 | .\" | 13 | .\" |
14 | .Dd September 25, 1999 | 14 | .Dd September 25, 1999 |
15 | .Dt SCP 1 | 15 | .Dt SCP 1 |
@@ -20,24 +20,24 @@ | |||
20 | .Sh SYNOPSIS | 20 | .Sh SYNOPSIS |
21 | .Nm scp | 21 | .Nm scp |
22 | .Bk -words | 22 | .Bk -words |
23 | .Op Fl pqrvBC1246 | 23 | .Op Fl 1246BCpqrv |
24 | .Op Fl F Ar ssh_config | ||
25 | .Op Fl S Ar program | ||
26 | .Op Fl P Ar port | ||
27 | .Op Fl c Ar cipher | 24 | .Op Fl c Ar cipher |
25 | .Op Fl F Ar ssh_config | ||
28 | .Op Fl i Ar identity_file | 26 | .Op Fl i Ar identity_file |
29 | .Op Fl l Ar limit | 27 | .Op Fl l Ar limit |
30 | .Op Fl o Ar ssh_option | 28 | .Op Fl o Ar ssh_option |
29 | .Op Fl P Ar port | ||
30 | .Op Fl S Ar program | ||
31 | .Sm off | 31 | .Sm off |
32 | .Oo | 32 | .Oo |
33 | .Op Ar user@ | 33 | .Op Ar user No @ |
34 | .Ar host1 No : | 34 | .Ar host1 No : |
35 | .Oc Ns Ar file1 | 35 | .Oc Ns Ar file1 |
36 | .Sm on | 36 | .Sm on |
37 | .Op Ar ... | 37 | .Op Ar ... |
38 | .Sm off | 38 | .Sm off |
39 | .Oo | 39 | .Oo |
40 | .Op Ar user@ | 40 | .Op Ar user No @ |
41 | .Ar host2 No : | 41 | .Ar host2 No : |
42 | .Oc Ar file2 | 42 | .Oc Ar file2 |
43 | .Sm on | 43 | .Sm on |
@@ -62,35 +62,24 @@ Copies between two remote hosts are permitted. | |||
62 | .Pp | 62 | .Pp |
63 | The options are as follows: | 63 | The options are as follows: |
64 | .Bl -tag -width Ds | 64 | .Bl -tag -width Ds |
65 | .It Fl c Ar cipher | 65 | .It Fl 1 |
66 | Selects the cipher to use for encrypting the data transfer. | 66 | Forces |
67 | This option is directly passed to | ||
68 | .Xr ssh 1 . | ||
69 | .It Fl i Ar identity_file | ||
70 | Selects the file from which the identity (private key) for RSA | ||
71 | authentication is read. | ||
72 | This option is directly passed to | ||
73 | .Xr ssh 1 . | ||
74 | .It Fl l Ar limit | ||
75 | Limits the used bandwidth, specified in Kbit/s. | ||
76 | .It Fl p | ||
77 | Preserves modification times, access times, and modes from the | ||
78 | original file. | ||
79 | .It Fl r | ||
80 | Recursively copy entire directories. | ||
81 | .It Fl v | ||
82 | Verbose mode. | ||
83 | Causes | ||
84 | .Nm | 67 | .Nm |
85 | and | 68 | to use protocol 1. |
86 | .Xr ssh 1 | 69 | .It Fl 2 |
87 | to print debugging messages about their progress. | 70 | Forces |
88 | This is helpful in | 71 | .Nm |
89 | debugging connection, authentication, and configuration problems. | 72 | to use protocol 2. |
73 | .It Fl 4 | ||
74 | Forces | ||
75 | .Nm | ||
76 | to use IPv4 addresses only. | ||
77 | .It Fl 6 | ||
78 | Forces | ||
79 | .Nm | ||
80 | to use IPv6 addresses only. | ||
90 | .It Fl B | 81 | .It Fl B |
91 | Selects batch mode (prevents asking for passwords or passphrases). | 82 | Selects batch mode (prevents asking for passwords or passphrases). |
92 | .It Fl q | ||
93 | Disables the progress meter. | ||
94 | .It Fl C | 83 | .It Fl C |
95 | Compression enable. | 84 | Compression enable. |
96 | Passes the | 85 | Passes the |
@@ -98,12 +87,78 @@ Passes the | |||
98 | flag to | 87 | flag to |
99 | .Xr ssh 1 | 88 | .Xr ssh 1 |
100 | to enable compression. | 89 | to enable compression. |
90 | .It Fl c Ar cipher | ||
91 | Selects the cipher to use for encrypting the data transfer. | ||
92 | This option is directly passed to | ||
93 | .Xr ssh 1 . | ||
101 | .It Fl F Ar ssh_config | 94 | .It Fl F Ar ssh_config |
102 | Specifies an alternative | 95 | Specifies an alternative |
103 | per-user configuration file for | 96 | per-user configuration file for |
104 | .Nm ssh . | 97 | .Nm ssh . |
105 | This option is directly passed to | 98 | This option is directly passed to |
106 | .Xr ssh 1 . | 99 | .Xr ssh 1 . |
100 | .It Fl i Ar identity_file | ||
101 | Selects the file from which the identity (private key) for RSA | ||
102 | authentication is read. | ||
103 | This option is directly passed to | ||
104 | .Xr ssh 1 . | ||
105 | .It Fl l Ar limit | ||
106 | Limits the used bandwidth, specified in Kbit/s. | ||
107 | .It Fl o Ar ssh_option | ||
108 | Can be used to pass options to | ||
109 | .Nm ssh | ||
110 | in the format used in | ||
111 | .Xr ssh_config 5 . | ||
112 | This is useful for specifying options | ||
113 | for which there is no separate | ||
114 | .Nm scp | ||
115 | command-line flag. | ||
116 | For full details of the options listed below, and their possible values, see | ||
117 | .Xr ssh_config 5 . | ||
118 | .Pp | ||
119 | .Bl -tag -width Ds -offset indent -compact | ||
120 | .It AddressFamily | ||
121 | .It BatchMode | ||
122 | .It BindAddress | ||
123 | .It ChallengeResponseAuthentication | ||
124 | .It CheckHostIP | ||
125 | .It Cipher | ||
126 | .It Ciphers | ||
127 | .It Compression | ||
128 | .It CompressionLevel | ||
129 | .It ConnectionAttempts | ||
130 | .It ConnectionTimeout | ||
131 | .It GlobalKnownHostsFile | ||
132 | .It GSSAPIAuthentication | ||
133 | .It GSSAPIDelegateCredentials | ||
134 | .It Host | ||
135 | .It HostbasedAuthentication | ||
136 | .It HostKeyAlgorithms | ||
137 | .It HostKeyAlias | ||
138 | .It HostName | ||
139 | .It IdentityFile | ||
140 | .It LogLevel | ||
141 | .It MACs | ||
142 | .It NoHostAuthenticationForLocalhost | ||
143 | .It NumberOfPasswordPrompts | ||
144 | .It PasswordAuthentication | ||
145 | .It Port | ||
146 | .It PreferredAuthentications | ||
147 | .It Protocol | ||
148 | .It ProxyCommand | ||
149 | .It PubkeyAuthentication | ||
150 | .It RhostsRSAAuthentication | ||
151 | .It RSAAuthentication | ||
152 | .It ServerAliveInterval | ||
153 | .It ServerAliveCountMax | ||
154 | .It SmartcardDevice | ||
155 | .It StrictHostKeyChecking | ||
156 | .It TCPKeepAlive | ||
157 | .It UsePrivilegedPort | ||
158 | .It User | ||
159 | .It UserKnownHostsFile | ||
160 | .It VerifyHostKeyDNS | ||
161 | .El | ||
107 | .It Fl P Ar port | 162 | .It Fl P Ar port |
108 | Specifies the port to connect to on the remote host. | 163 | Specifies the port to connect to on the remote host. |
109 | Note that this option is written with a capital | 164 | Note that this option is written with a capital |
@@ -112,6 +167,13 @@ because | |||
112 | .Fl p | 167 | .Fl p |
113 | is already reserved for preserving the times and modes of the file in | 168 | is already reserved for preserving the times and modes of the file in |
114 | .Xr rcp 1 . | 169 | .Xr rcp 1 . |
170 | .It Fl p | ||
171 | Preserves modification times, access times, and modes from the | ||
172 | original file. | ||
173 | .It Fl q | ||
174 | Disables the progress meter. | ||
175 | .It Fl r | ||
176 | Recursively copy entire directories. | ||
115 | .It Fl S Ar program | 177 | .It Fl S Ar program |
116 | Name of | 178 | Name of |
117 | .Ar program | 179 | .Ar program |
@@ -119,31 +181,15 @@ to use for the encrypted connection. | |||
119 | The program must understand | 181 | The program must understand |
120 | .Xr ssh 1 | 182 | .Xr ssh 1 |
121 | options. | 183 | options. |
122 | .It Fl o Ar ssh_option | 184 | .It Fl v |
123 | Can be used to pass options to | 185 | Verbose mode. |
124 | .Nm ssh | 186 | Causes |
125 | in the format used in | ||
126 | .Xr ssh_config 5 . | ||
127 | This is useful for specifying options | ||
128 | for which there is no separate | ||
129 | .Nm scp | ||
130 | command-line flag. | ||
131 | .It Fl 1 | ||
132 | Forces | ||
133 | .Nm | ||
134 | to use protocol 1. | ||
135 | .It Fl 2 | ||
136 | Forces | ||
137 | .Nm | ||
138 | to use protocol 2. | ||
139 | .It Fl 4 | ||
140 | Forces | ||
141 | .Nm | ||
142 | to use IPv4 addresses only. | ||
143 | .It Fl 6 | ||
144 | Forces | ||
145 | .Nm | 187 | .Nm |
146 | to use IPv6 addresses only. | 188 | and |
189 | .Xr ssh 1 | ||
190 | to print debugging messages about their progress. | ||
191 | This is helpful in | ||
192 | debugging connection, authentication, and configuration problems. | ||
147 | .El | 193 | .El |
148 | .Sh DIAGNOSTICS | 194 | .Sh DIAGNOSTICS |
149 | .Nm | 195 | .Nm |
@@ -165,5 +211,4 @@ program in BSD source code from the Regents of the University of | |||
165 | California. | 211 | California. |
166 | .Sh AUTHORS | 212 | .Sh AUTHORS |
167 | .An Timo Rinne Aq tri@iki.fi | 213 | .An Timo Rinne Aq tri@iki.fi |
168 | and | ||
169 | .An Tatu Ylonen Aq ylo@cs.hut.fi | 214 | .An Tatu Ylonen Aq ylo@cs.hut.fi |