summaryrefslogtreecommitdiff
path: root/scp.0
diff options
context:
space:
mode:
Diffstat (limited to 'scp.0')
-rw-r--r--scp.0159
1 files changed, 159 insertions, 0 deletions
diff --git a/scp.0 b/scp.0
new file mode 100644
index 000000000..0cb7726c7
--- /dev/null
+++ b/scp.0
@@ -0,0 +1,159 @@
1SCP(1) General Commands Manual SCP(1)
2
3NAME
4 scp M-bM-^@M-^S secure copy (remote file copy program)
5
6SYNOPSIS
7 scp [-346BCpqrv] [-c cipher] [-F ssh_config] [-i identity_file]
8 [-l limit] [-o ssh_option] [-P port] [-S program]
9 [[user@]host1:]file1 ... [[user@]host2:]file2
10
11DESCRIPTION
12 scp copies files between hosts on a network. It uses ssh(1) for data
13 transfer, and uses the same authentication and provides the same security
14 as ssh(1). scp will ask for passwords or passphrases if they are needed
15 for authentication.
16
17 File names may contain a user and host specification to indicate that the
18 file is to be copied to/from that host. Local file names can be made
19 explicit using absolute or relative pathnames to avoid scp treating file
20 names containing M-bM-^@M-^X:M-bM-^@M-^Y as host specifiers. Copies between two remote hosts
21 are also permitted.
22
23 The options are as follows:
24
25 -3 Copies between two remote hosts are transferred through the local
26 host. Without this option the data is copied directly between
27 the two remote hosts. Note that this option disables the
28 progress meter.
29
30 -4 Forces scp to use IPv4 addresses only.
31
32 -6 Forces scp to use IPv6 addresses only.
33
34 -B Selects batch mode (prevents asking for passwords or
35 passphrases).
36
37 -C Compression enable. Passes the -C flag to ssh(1) to enable
38 compression.
39
40 -c cipher
41 Selects the cipher to use for encrypting the data transfer. This
42 option is directly passed to ssh(1).
43
44 -F ssh_config
45 Specifies an alternative per-user configuration file for ssh.
46 This option is directly passed to ssh(1).
47
48 -i identity_file
49 Selects the file from which the identity (private key) for public
50 key authentication is read. This option is directly passed to
51 ssh(1).
52
53 -l limit
54 Limits the used bandwidth, specified in Kbit/s.
55
56 -o ssh_option
57 Can be used to pass options to ssh in the format used in
58 ssh_config(5). This is useful for specifying options for which
59 there is no separate scp command-line flag. For full details of
60 the options listed below, and their possible values, see
61 ssh_config(5).
62
63 AddressFamily
64 BatchMode
65 BindAddress
66 CanonicalDomains
67 CanonicalizeFallbackLocal
68 CanonicalizeHostname
69 CanonicalizeMaxDots
70 CanonicalizePermittedCNAMEs
71 CertificateFile
72 ChallengeResponseAuthentication
73 CheckHostIP
74 Ciphers
75 Compression
76 ConnectionAttempts
77 ConnectTimeout
78 ControlMaster
79 ControlPath
80 ControlPersist
81 GlobalKnownHostsFile
82 GSSAPIAuthentication
83 GSSAPIDelegateCredentials
84 HashKnownHosts
85 Host
86 HostbasedAuthentication
87 HostbasedKeyTypes
88 HostKeyAlgorithms
89 HostKeyAlias
90 HostName
91 IdentitiesOnly
92 IdentityAgent
93 IdentityFile
94 IPQoS
95 KbdInteractiveAuthentication
96 KbdInteractiveDevices
97 KexAlgorithms
98 LogLevel
99 MACs
100 NoHostAuthenticationForLocalhost
101 NumberOfPasswordPrompts
102 PasswordAuthentication
103 PKCS11Provider
104 Port
105 PreferredAuthentications
106 ProxyCommand
107 ProxyJump
108 PubkeyAcceptedKeyTypes
109 PubkeyAuthentication
110 RekeyLimit
111 SendEnv
112 ServerAliveInterval
113 ServerAliveCountMax
114 StrictHostKeyChecking
115 TCPKeepAlive
116 UpdateHostKeys
117 UsePrivilegedPort
118 User
119 UserKnownHostsFile
120 VerifyHostKeyDNS
121
122 -P port
123 Specifies the port to connect to on the remote host. Note that
124 this option is written with a capital M-bM-^@M-^XPM-bM-^@M-^Y, because -p is already
125 reserved for preserving the times and modes of the file.
126
127 -p Preserves modification times, access times, and modes from the
128 original file.
129
130 -q Quiet mode: disables the progress meter as well as warning and
131 diagnostic messages from ssh(1).
132
133 -r Recursively copy entire directories. Note that scp follows
134 symbolic links encountered in the tree traversal.
135
136 -S program
137 Name of program to use for the encrypted connection. The program
138 must understand ssh(1) options.
139
140 -v Verbose mode. Causes scp and ssh(1) to print debugging messages
141 about their progress. This is helpful in debugging connection,
142 authentication, and configuration problems.
143
144EXIT STATUS
145 The scp utility exitsM-BM- 0 on success, andM-BM- >0 if an error occurs.
146
147SEE ALSO
148 sftp(1), ssh(1), ssh-add(1), ssh-agent(1), ssh-keygen(1), ssh_config(5),
149 sshd(8)
150
151HISTORY
152 scp is based on the rcp program in BSD source code from the Regents of
153 the University of California.
154
155AUTHORS
156 Timo Rinne <tri@iki.fi>
157 Tatu Ylonen <ylo@cs.hut.fi>
158
159OpenBSD 6.2 May 3, 2017 OpenBSD 6.2