1 SCP(1) General Commands Manual SCP(1) 2 3 NAME 4 scp M-bM-^@M-^S secure copy (remote file copy program) 5 6 SYNOPSIS 7 scp [-12346BCpqrv] [-c cipher] [-F ssh_config] [-i identity_file] 8 [-l limit] [-o ssh_option] [-P port] [-S program] 9 [[user@]host1:]file1 ... [[user@]host2:]file2 10 11 DESCRIPTION 12 scp copies files between hosts on a network. It uses ssh(1) for data 13 transfer, and uses the same authentication and provides the same security 14 as ssh(1). scp will ask for passwords or passphrases if they are needed 15 for authentication. 16 17 File names may contain a user and host specification to indicate that the 18 file is to be copied to/from that host. Local file names can be made 19 explicit using absolute or relative pathnames to avoid scp treating file 20 names containing M-bM-^@M-^X:M-bM-^@M-^Y as host specifiers. Copies between two remote hosts 21 are also permitted. 22 23 The options are as follows: 24 25 -1 Forces scp to use protocol 1. 26 27 -2 Forces scp to use protocol 2. 28 29 -3 Copies between two remote hosts are transferred through the local 30 host. Without this option the data is copied directly between 31 the two remote hosts. Note that this option disables the 32 progress meter. 33 34 -4 Forces scp to use IPv4 addresses only. 35 36 -6 Forces scp to use IPv6 addresses only. 37 38 -B Selects batch mode (prevents asking for passwords or 39 passphrases). 40 41 -C Compression enable. Passes the -C flag to ssh(1) to enable 42 compression. 43 44 -c cipher 45 Selects the cipher to use for encrypting the data transfer. This 46 option is directly passed to ssh(1). 47 48 -F ssh_config 49 Specifies an alternative per-user configuration file for ssh. 50 This option is directly passed to ssh(1). 51 52 -i identity_file 53 Selects the file from which the identity (private key) for public 54 key authentication is read. This option is directly passed to 55 ssh(1). 56 57 -l limit 58 Limits the used bandwidth, specified in Kbit/s. 59 60 -o ssh_option 61 Can be used to pass options to ssh in the format used in 62 ssh_config(5). This is useful for specifying options for which 63 there is no separate scp command-line flag. For full details of 64 the options listed below, and their possible values, see 65 ssh_config(5). 66 67 AddressFamily 68 BatchMode 69 BindAddress 70 CanonicalDomains 71 CanonicalizeFallbackLocal 72 CanonicalizeHostname 73 CanonicalizeMaxDots 74 CanonicalizePermittedCNAMEs 75 CertificateFile 76 ChallengeResponseAuthentication 77 CheckHostIP 78 Cipher 79 Ciphers 80 Compression 81 CompressionLevel 82 ConnectionAttempts 83 ConnectTimeout 84 ControlMaster 85 ControlPath 86 ControlPersist 87 GlobalKnownHostsFile 88 GSSAPIAuthentication 89 GSSAPIDelegateCredentials 90 HashKnownHosts 91 Host 92 HostbasedAuthentication 93 HostbasedKeyTypes 94 HostKeyAlgorithms 95 HostKeyAlias 96 HostName 97 IdentitiesOnly 98 IdentityAgent 99 IdentityFile 100 IPQoS 101 KbdInteractiveAuthentication 102 KbdInteractiveDevices 103 KexAlgorithms 104 LogLevel 105 MACs 106 NoHostAuthenticationForLocalhost 107 NumberOfPasswordPrompts 108 PasswordAuthentication 109 PKCS11Provider 110 Port 111 PreferredAuthentications 112 Protocol 113 ProxyCommand 114 ProxyJump 115 PubkeyAcceptedKeyTypes 116 PubkeyAuthentication 117 RekeyLimit 118 RhostsRSAAuthentication 119 RSAAuthentication 120 SendEnv 121 ServerAliveInterval 122 ServerAliveCountMax 123 StrictHostKeyChecking 124 TCPKeepAlive 125 UpdateHostKeys 126 UsePrivilegedPort 127 User 128 UserKnownHostsFile 129 VerifyHostKeyDNS 130 131 -P port 132 Specifies the port to connect to on the remote host. Note that 133 this option is written with a capital M-bM-^@M-^XPM-bM-^@M-^Y, because -p is already 134 reserved for preserving the times and modes of the file. 135 136 -p Preserves modification times, access times, and modes from the 137 original file. 138 139 -q Quiet mode: disables the progress meter as well as warning and 140 diagnostic messages from ssh(1). 141 142 -r Recursively copy entire directories. Note that scp follows 143 symbolic links encountered in the tree traversal. 144 145 -S program 146 Name of program to use for the encrypted connection. The program 147 must understand ssh(1) options. 148 149 -v Verbose mode. Causes scp and ssh(1) to print debugging messages 150 about their progress. This is helpful in debugging connection, 151 authentication, and configuration problems. 152 153 EXIT STATUS 154 The scp utility exitsM-BM- 0 on success, andM-BM- >0 if an error occurs. 155 156 SEE ALSO 157 sftp(1), ssh(1), ssh-add(1), ssh-agent(1), ssh-keygen(1), ssh_config(5), 158 sshd(8) 159 160 HISTORY 161 scp is based on the rcp program in BSD source code from the Regents of 162 the University of California. 163 164 AUTHORS 165 Timo Rinne <tri (a] iki.fi> 166 Tatu Ylonen <ylo (a] cs.hut.fi> 167 168 OpenBSD 6.0 July 16, 2016 OpenBSD 6.0 169