summaryrefslogtreecommitdiff
path: root/scp.0
diff options
context:
space:
mode:
Diffstat (limited to 'scp.0')
-rw-r--r--scp.0116
1 files changed, 80 insertions, 36 deletions
diff --git a/scp.0 b/scp.0
index 8f4e813a4..d107ae7f7 100644
--- a/scp.0
+++ b/scp.0
@@ -4,9 +4,9 @@ NAME
4 scp - secure copy (remote file copy program) 4 scp - secure copy (remote file copy program)
5 5
6SYNOPSIS 6SYNOPSIS
7 scp [-pqrvBC1246] [-F ssh_config] [-S program] [-P port] [-c cipher] 7 scp [-1246BCpqrv] [-c cipher] [-F ssh_config] [-i identity_file]
8 [-i identity_file] [-l limit] [-o ssh_option] [[user@]host1:]file1 8 [-l limit] [-o ssh_option] [-P port] [-S program]
9 [...] [[user@]host2:]file2 9 [[user@]host1:]file1 [...] [[user@]host2:]file2
10 10
11DESCRIPTION 11DESCRIPTION
12 scp copies files between hosts on a network. It uses ssh(1) for data 12 scp copies files between hosts on a network. It uses ssh(1) for data
@@ -20,61 +20,105 @@ DESCRIPTION
20 20
21 The options are as follows: 21 The options are as follows:
22 22
23 -c cipher 23 -1 Forces scp to use protocol 1.
24 Selects the cipher to use for encrypting the data transfer. This
25 option is directly passed to ssh(1).
26
27 -i identity_file
28 Selects the file from which the identity (private key) for RSA
29 authentication is read. This option is directly passed to
30 ssh(1).
31
32 -l limit
33 Limits the used bandwidth, specified in Kbit/s.
34 24
35 -p Preserves modification times, access times, and modes from the 25 -2 Forces scp to use protocol 2.
36 original file.
37 26
38 -r Recursively copy entire directories. 27 -4 Forces scp to use IPv4 addresses only.
39 28
40 -v Verbose mode. Causes scp and ssh(1) to print debugging messages 29 -6 Forces scp to use IPv6 addresses only.
41 about their progress. This is helpful in debugging connection,
42 authentication, and configuration problems.
43 30
44 -B Selects batch mode (prevents asking for passwords or passphras- 31 -B Selects batch mode (prevents asking for passwords or passphras-
45 es). 32 es).
46 33
47 -q Disables the progress meter.
48
49 -C Compression enable. Passes the -C flag to ssh(1) to enable com- 34 -C Compression enable. Passes the -C flag to ssh(1) to enable com-
50 pression. 35 pression.
51 36
37 -c cipher
38 Selects the cipher to use for encrypting the data transfer. This
39 option is directly passed to ssh(1).
40
52 -F ssh_config 41 -F ssh_config
53 Specifies an alternative per-user configuration file for ssh. 42 Specifies an alternative per-user configuration file for ssh.
54 This option is directly passed to ssh(1). 43 This option is directly passed to ssh(1).
55 44
45 -i identity_file
46 Selects the file from which the identity (private key) for RSA
47 authentication is read. This option is directly passed to
48 ssh(1).
49
50 -l limit
51 Limits the used bandwidth, specified in Kbit/s.
52
53 -o ssh_option
54 Can be used to pass options to ssh in the format used in
55 ssh_config(5). This is useful for specifying options for which
56 there is no separate scp command-line flag. For full details of
57 the options listed below, and their possible values, see
58 ssh_config(5).
59
60 AddressFamily
61 BatchMode
62 BindAddress
63 ChallengeResponseAuthentication
64 CheckHostIP
65 Cipher
66 Ciphers
67 Compression
68 CompressionLevel
69 ConnectionAttempts
70 ConnectionTimeout
71 GlobalKnownHostsFile
72 GSSAPIAuthentication
73 GSSAPIDelegateCredentials
74 Host
75 HostbasedAuthentication
76 HostKeyAlgorithms
77 HostKeyAlias
78 HostName
79 IdentityFile
80 LogLevel
81 MACs
82 NoHostAuthenticationForLocalhost
83 NumberOfPasswordPrompts
84 PasswordAuthentication
85 Port
86 PreferredAuthentications
87 Protocol
88 ProxyCommand
89 PubkeyAuthentication
90 RhostsRSAAuthentication
91 RSAAuthentication
92 ServerAliveInterval
93 ServerAliveCountMax
94 SmartcardDevice
95 StrictHostKeyChecking
96 TCPKeepAlive
97 UsePrivilegedPort
98 User
99 UserKnownHostsFile
100 VerifyHostKeyDNS
101
56 -P port 102 -P port
57 Specifies the port to connect to on the remote host. Note that 103 Specifies the port to connect to on the remote host. Note that
58 this option is written with a capital `P', because -p is already 104 this option is written with a capital `P', because -p is already
59 reserved for preserving the times and modes of the file in 105 reserved for preserving the times and modes of the file in
60 rcp(1). 106 rcp(1).
61 107
62 -S program 108 -p Preserves modification times, access times, and modes from the
63 Name of program to use for the encrypted connection. The program 109 original file.
64 must understand ssh(1) options.
65
66 -o ssh_option
67 Can be used to pass options to ssh in the format used in
68 ssh_config(5). This is useful for specifying options for which
69 there is no separate scp command-line flag.
70 110
71 -1 Forces scp to use protocol 1. 111 -q Disables the progress meter.
72 112
73 -2 Forces scp to use protocol 2. 113 -r Recursively copy entire directories.
74 114
75 -4 Forces scp to use IPv4 addresses only. 115 -S program
116 Name of program to use for the encrypted connection. The program
117 must understand ssh(1) options.
76 118
77 -6 Forces scp to use IPv6 addresses only. 119 -v Verbose mode. Causes scp and ssh(1) to print debugging messages
120 about their progress. This is helpful in debugging connection,
121 authentication, and configuration problems.
78 122
79DIAGNOSTICS 123DIAGNOSTICS
80 scp exits with 0 on success or >0 if an error occurred. 124 scp exits with 0 on success or >0 if an error occurred.
@@ -88,7 +132,7 @@ HISTORY
88 the University of California. 132 the University of California.
89 133
90AUTHORS 134AUTHORS
91 Timo Rinne <tri@iki.fi> and 135 Timo Rinne <tri@iki.fi>
92 Tatu Ylonen <ylo@cs.hut.fi> 136 Tatu Ylonen <ylo@cs.hut.fi>
93 137
94OpenBSD 3.4 September 25, 1999 2 138OpenBSD 3.4 September 25, 1999 3