diff options
Diffstat (limited to 'scp.0')
-rw-r--r-- | scp.0 | 148 |
1 files changed, 148 insertions, 0 deletions
@@ -0,0 +1,148 @@ | |||
1 | SCP(1) OpenBSD Reference Manual SCP(1) | ||
2 | |||
3 | NAME | ||
4 | scp - secure copy (remote file copy program) | ||
5 | |||
6 | SYNOPSIS | ||
7 | scp [-1246BCpqrv] [-c cipher] [-F ssh_config] [-i identity_file] | ||
8 | [-l limit] [-o ssh_option] [-P port] [-S program] | ||
9 | [[user@]host1:]file1 ... [[user@]host2:]file2 | ||
10 | |||
11 | DESCRIPTION | ||
12 | scp copies files between hosts on a network. It uses ssh(1) for data | ||
13 | transfer, and uses the same authentication and provides the same security | ||
14 | as ssh(1). Unlike rcp(1), scp will ask for passwords or passphrases if | ||
15 | they are needed for authentication. | ||
16 | |||
17 | File names may contain a user and host specification to indicate that the | ||
18 | file is to be copied to/from that host. Local file names can be made ex- | ||
19 | plicit using absolute or relative pathnames to avoid scp treating file | ||
20 | names containing `:' as host specifiers. Copies between two remote hosts | ||
21 | are also permitted. | ||
22 | |||
23 | The options are as follows: | ||
24 | |||
25 | -1 Forces scp to use protocol 1. | ||
26 | |||
27 | -2 Forces scp to use protocol 2. | ||
28 | |||
29 | -4 Forces scp to use IPv4 addresses only. | ||
30 | |||
31 | -6 Forces scp to use IPv6 addresses only. | ||
32 | |||
33 | -B Selects batch mode (prevents asking for passwords or passphras- | ||
34 | es). | ||
35 | |||
36 | -C Compression enable. Passes the -C flag to ssh(1) to enable com- | ||
37 | pression. | ||
38 | |||
39 | -c cipher | ||
40 | Selects the cipher to use for encrypting the data transfer. This | ||
41 | option is directly passed to ssh(1). | ||
42 | |||
43 | -F ssh_config | ||
44 | Specifies an alternative per-user configuration file for ssh. | ||
45 | This option is directly passed to ssh(1). | ||
46 | |||
47 | -i identity_file | ||
48 | Selects the file from which the identity (private key) for public | ||
49 | key authentication is read. This option is directly passed to | ||
50 | ssh(1). | ||
51 | |||
52 | -l limit | ||
53 | Limits the used bandwidth, specified in Kbit/s. | ||
54 | |||
55 | -o ssh_option | ||
56 | Can be used to pass options to ssh in the format used in | ||
57 | ssh_config(5). This is useful for specifying options for which | ||
58 | there is no separate scp command-line flag. For full details of | ||
59 | the options listed below, and their possible values, see | ||
60 | ssh_config(5). | ||
61 | |||
62 | AddressFamily | ||
63 | BatchMode | ||
64 | BindAddress | ||
65 | ChallengeResponseAuthentication | ||
66 | CheckHostIP | ||
67 | Cipher | ||
68 | Ciphers | ||
69 | Compression | ||
70 | CompressionLevel | ||
71 | ConnectionAttempts | ||
72 | ConnectTimeout | ||
73 | ControlMaster | ||
74 | ControlPath | ||
75 | GlobalKnownHostsFile | ||
76 | GSSAPIAuthentication | ||
77 | GSSAPIDelegateCredentials | ||
78 | HashKnownHosts | ||
79 | Host | ||
80 | HostbasedAuthentication | ||
81 | HostKeyAlgorithms | ||
82 | HostKeyAlias | ||
83 | HostName | ||
84 | IdentityFile | ||
85 | IdentitiesOnly | ||
86 | KbdInteractiveDevices | ||
87 | LogLevel | ||
88 | MACs | ||
89 | NoHostAuthenticationForLocalhost | ||
90 | NumberOfPasswordPrompts | ||
91 | PasswordAuthentication | ||
92 | Port | ||
93 | PreferredAuthentications | ||
94 | Protocol | ||
95 | ProxyCommand | ||
96 | PubkeyAuthentication | ||
97 | RekeyLimit | ||
98 | RhostsRSAAuthentication | ||
99 | RSAAuthentication | ||
100 | SendEnv | ||
101 | ServerAliveInterval | ||
102 | ServerAliveCountMax | ||
103 | SmartcardDevice | ||
104 | StrictHostKeyChecking | ||
105 | TCPKeepAlive | ||
106 | UsePrivilegedPort | ||
107 | User | ||
108 | UserKnownHostsFile | ||
109 | VerifyHostKeyDNS | ||
110 | |||
111 | -P port | ||
112 | Specifies the port to connect to on the remote host. Note that | ||
113 | this option is written with a capital `P', because -p is already | ||
114 | reserved for preserving the times and modes of the file in | ||
115 | rcp(1). | ||
116 | |||
117 | -p Preserves modification times, access times, and modes from the | ||
118 | original file. | ||
119 | |||
120 | -q Quiet mode: disables the progress meter as well as warning and | ||
121 | diagnostic messages from ssh(1). | ||
122 | |||
123 | -r Recursively copy entire directories. Note that scp follows sym- | ||
124 | bolic links encountered in the tree traversal. | ||
125 | |||
126 | -S program | ||
127 | Name of program to use for the encrypted connection. The program | ||
128 | must understand ssh(1) options. | ||
129 | |||
130 | -v Verbose mode. Causes scp and ssh(1) to print debugging messages | ||
131 | about their progress. This is helpful in debugging connection, | ||
132 | authentication, and configuration problems. | ||
133 | |||
134 | The scp utility exits 0 on success, and >0 if an error occurs. | ||
135 | |||
136 | SEE ALSO | ||
137 | rcp(1), sftp(1), ssh(1), ssh-add(1), ssh-agent(1), ssh-keygen(1), | ||
138 | ssh_config(5), sshd(8) | ||
139 | |||
140 | HISTORY | ||
141 | scp is based on the rcp(1) program in BSD source code from the Regents of | ||
142 | the University of California. | ||
143 | |||
144 | AUTHORS | ||
145 | Timo Rinne <tri@iki.fi> | ||
146 | Tatu Ylonen <ylo@cs.hut.fi> | ||
147 | |||
148 | OpenBSD 4.4 July 12, 2008 3 | ||