summaryrefslogtreecommitdiff
path: root/scp.1
diff options
context:
space:
mode:
authorColin Watson <cjwatson@debian.org>2004-03-01 02:25:32 +0000
committerColin Watson <cjwatson@debian.org>2004-03-01 02:25:32 +0000
commitea8116a11e3de70036dbc665ccb0d486cf89cac9 (patch)
treed73ccdff78d8608e156465af42e6a1b3527fb2d6 /scp.1
parente39b311381a5609cc05acf298c42fba196dc524b (diff)
parentf5bda272678ec6dccaa5f29379cf60cb855018e8 (diff)
Merge 3.8p1 to the trunk. This builds and runs, but I haven't tested it
extensively yet. ProtocolKeepAlives is now just a compatibility alias for ServerAliveInterval.
Diffstat (limited to 'scp.1')
-rw-r--r--scp.1161
1 files changed, 103 insertions, 58 deletions
diff --git a/scp.1 b/scp.1
index a971500ee..f5ca1e45a 100644
--- a/scp.1
+++ b/scp.1
@@ -9,7 +9,7 @@
9.\" 9.\"
10.\" Created: Sun May 7 00:14:37 1995 ylo 10.\" Created: Sun May 7 00:14:37 1995 ylo
11.\" 11.\"
12.\" $OpenBSD: scp.1,v 1.28 2003/06/10 09:12:11 jmc Exp $ 12.\" $OpenBSD: scp.1,v 1.32 2003/12/16 15:49:51 markus Exp $
13.\" 13.\"
14.Dd September 25, 1999 14.Dd September 25, 1999
15.Dt SCP 1 15.Dt SCP 1
@@ -20,24 +20,24 @@
20.Sh SYNOPSIS 20.Sh SYNOPSIS
21.Nm scp 21.Nm scp
22.Bk -words 22.Bk -words
23.Op Fl pqrvBC1246 23.Op Fl 1246BCpqrv
24.Op Fl F Ar ssh_config
25.Op Fl S Ar program
26.Op Fl P Ar port
27.Op Fl c Ar cipher 24.Op Fl c Ar cipher
25.Op Fl F Ar ssh_config
28.Op Fl i Ar identity_file 26.Op Fl i Ar identity_file
29.Op Fl l Ar limit 27.Op Fl l Ar limit
30.Op Fl o Ar ssh_option 28.Op Fl o Ar ssh_option
29.Op Fl P Ar port
30.Op Fl S Ar program
31.Sm off 31.Sm off
32.Oo 32.Oo
33.Op Ar user@ 33.Op Ar user No @
34.Ar host1 No : 34.Ar host1 No :
35.Oc Ns Ar file1 35.Oc Ns Ar file1
36.Sm on 36.Sm on
37.Op Ar ... 37.Op Ar ...
38.Sm off 38.Sm off
39.Oo 39.Oo
40.Op Ar user@ 40.Op Ar user No @
41.Ar host2 No : 41.Ar host2 No :
42.Oc Ar file2 42.Oc Ar file2
43.Sm on 43.Sm on
@@ -62,35 +62,24 @@ Copies between two remote hosts are permitted.
62.Pp 62.Pp
63The options are as follows: 63The options are as follows:
64.Bl -tag -width Ds 64.Bl -tag -width Ds
65.It Fl c Ar cipher 65.It Fl 1
66Selects the cipher to use for encrypting the data transfer. 66Forces
67This option is directly passed to
68.Xr ssh 1 .
69.It Fl i Ar identity_file
70Selects the file from which the identity (private key) for RSA
71authentication is read.
72This option is directly passed to
73.Xr ssh 1 .
74.It Fl l Ar limit
75Limits the used bandwidth, specified in Kbit/s.
76.It Fl p
77Preserves modification times, access times, and modes from the
78original file.
79.It Fl r
80Recursively copy entire directories.
81.It Fl v
82Verbose mode.
83Causes
84.Nm 67.Nm
85and 68to use protocol 1.
86.Xr ssh 1 69.It Fl 2
87to print debugging messages about their progress. 70Forces
88This is helpful in 71.Nm
89debugging connection, authentication, and configuration problems. 72to use protocol 2.
73.It Fl 4
74Forces
75.Nm
76to use IPv4 addresses only.
77.It Fl 6
78Forces
79.Nm
80to use IPv6 addresses only.
90.It Fl B 81.It Fl B
91Selects batch mode (prevents asking for passwords or passphrases). 82Selects batch mode (prevents asking for passwords or passphrases).
92.It Fl q
93Disables the progress meter.
94.It Fl C 83.It Fl C
95Compression enable. 84Compression enable.
96Passes the 85Passes the
@@ -98,12 +87,78 @@ Passes the
98flag to 87flag to
99.Xr ssh 1 88.Xr ssh 1
100to enable compression. 89to enable compression.
90.It Fl c Ar cipher
91Selects the cipher to use for encrypting the data transfer.
92This option is directly passed to
93.Xr ssh 1 .
101.It Fl F Ar ssh_config 94.It Fl F Ar ssh_config
102Specifies an alternative 95Specifies an alternative
103per-user configuration file for 96per-user configuration file for
104.Nm ssh . 97.Nm ssh .
105This option is directly passed to 98This option is directly passed to
106.Xr ssh 1 . 99.Xr ssh 1 .
100.It Fl i Ar identity_file
101Selects the file from which the identity (private key) for RSA
102authentication is read.
103This option is directly passed to
104.Xr ssh 1 .
105.It Fl l Ar limit
106Limits the used bandwidth, specified in Kbit/s.
107.It Fl o Ar ssh_option
108Can be used to pass options to
109.Nm ssh
110in the format used in
111.Xr ssh_config 5 .
112This is useful for specifying options
113for which there is no separate
114.Nm scp
115command-line flag.
116For full details of the options listed below, and their possible values, see
117.Xr ssh_config 5 .
118.Pp
119.Bl -tag -width Ds -offset indent -compact
120.It AddressFamily
121.It BatchMode
122.It BindAddress
123.It ChallengeResponseAuthentication
124.It CheckHostIP
125.It Cipher
126.It Ciphers
127.It Compression
128.It CompressionLevel
129.It ConnectionAttempts
130.It ConnectionTimeout
131.It GlobalKnownHostsFile
132.It GSSAPIAuthentication
133.It GSSAPIDelegateCredentials
134.It Host
135.It HostbasedAuthentication
136.It HostKeyAlgorithms
137.It HostKeyAlias
138.It HostName
139.It IdentityFile
140.It LogLevel
141.It MACs
142.It NoHostAuthenticationForLocalhost
143.It NumberOfPasswordPrompts
144.It PasswordAuthentication
145.It Port
146.It PreferredAuthentications
147.It Protocol
148.It ProxyCommand
149.It PubkeyAuthentication
150.It RhostsRSAAuthentication
151.It RSAAuthentication
152.It ServerAliveInterval
153.It ServerAliveCountMax
154.It SmartcardDevice
155.It StrictHostKeyChecking
156.It TCPKeepAlive
157.It UsePrivilegedPort
158.It User
159.It UserKnownHostsFile
160.It VerifyHostKeyDNS
161.El
107.It Fl P Ar port 162.It Fl P Ar port
108Specifies the port to connect to on the remote host. 163Specifies the port to connect to on the remote host.
109Note that this option is written with a capital 164Note that this option is written with a capital
@@ -112,6 +167,13 @@ because
112.Fl p 167.Fl p
113is already reserved for preserving the times and modes of the file in 168is already reserved for preserving the times and modes of the file in
114.Xr rcp 1 . 169.Xr rcp 1 .
170.It Fl p
171Preserves modification times, access times, and modes from the
172original file.
173.It Fl q
174Disables the progress meter.
175.It Fl r
176Recursively copy entire directories.
115.It Fl S Ar program 177.It Fl S Ar program
116Name of 178Name of
117.Ar program 179.Ar program
@@ -119,31 +181,15 @@ to use for the encrypted connection.
119The program must understand 181The program must understand
120.Xr ssh 1 182.Xr ssh 1
121options. 183options.
122.It Fl o Ar ssh_option 184.It Fl v
123Can be used to pass options to 185Verbose mode.
124.Nm ssh 186Causes
125in the format used in
126.Xr ssh_config 5 .
127This is useful for specifying options
128for which there is no separate
129.Nm scp
130command-line flag.
131.It Fl 1
132Forces
133.Nm
134to use protocol 1.
135.It Fl 2
136Forces
137.Nm
138to use protocol 2.
139.It Fl 4
140Forces
141.Nm
142to use IPv4 addresses only.
143.It Fl 6
144Forces
145.Nm 187.Nm
146to use IPv6 addresses only. 188and
189.Xr ssh 1
190to print debugging messages about their progress.
191This is helpful in
192debugging connection, authentication, and configuration problems.
147.El 193.El
148.Sh DIAGNOSTICS 194.Sh DIAGNOSTICS
149.Nm 195.Nm
@@ -165,5 +211,4 @@ program in BSD source code from the Regents of the University of
165California. 211California.
166.Sh AUTHORS 212.Sh AUTHORS
167.An Timo Rinne Aq tri@iki.fi 213.An Timo Rinne Aq tri@iki.fi
168and
169.An Tatu Ylonen Aq ylo@cs.hut.fi 214.An Tatu Ylonen Aq ylo@cs.hut.fi