Home | History | Annotate | Download | only in openssh
      1 SCP(1)                      General Commands Manual                     SCP(1)
      2 
      3 NAME
      4      scp M-bM-^@M-^S secure copy (remote file copy program)
      5 
      6 SYNOPSIS
      7      scp [-12346BCpqrv] [-c cipher] [-F ssh_config] [-i identity_file]
      8          [-l limit] [-o ssh_option] [-P port] [-S program]
      9          [[user@]host1:]file1 ... [[user@]host2:]file2
     10 
     11 DESCRIPTION
     12      scp copies files between hosts on a network.  It uses ssh(1) for data
     13      transfer, and uses the same authentication and provides the same security
     14      as ssh(1).  scp will ask for passwords or passphrases if they are needed
     15      for authentication.
     16 
     17      File names may contain a user and host specification to indicate that the
     18      file is to be copied to/from that host.  Local file names can be made
     19      explicit using absolute or relative pathnames to avoid scp treating file
     20      names containing M-bM-^@M-^X:M-bM-^@M-^Y as host specifiers.  Copies between two remote hosts
     21      are also permitted.
     22 
     23      The options are as follows:
     24 
     25      -1      Forces scp to use protocol 1.
     26 
     27      -2      Forces scp to use protocol 2.
     28 
     29      -3      Copies between two remote hosts are transferred through the local
     30              host.  Without this option the data is copied directly between
     31              the two remote hosts.  Note that this option disables the
     32              progress meter.
     33 
     34      -4      Forces scp to use IPv4 addresses only.
     35 
     36      -6      Forces scp to use IPv6 addresses only.
     37 
     38      -B      Selects batch mode (prevents asking for passwords or
     39              passphrases).
     40 
     41      -C      Compression enable.  Passes the -C flag to ssh(1) to enable
     42              compression.
     43 
     44      -c cipher
     45              Selects the cipher to use for encrypting the data transfer.  This
     46              option is directly passed to ssh(1).
     47 
     48      -F ssh_config
     49              Specifies an alternative per-user configuration file for ssh.
     50              This option is directly passed to ssh(1).
     51 
     52      -i identity_file
     53              Selects the file from which the identity (private key) for public
     54              key authentication is read.  This option is directly passed to
     55              ssh(1).
     56 
     57      -l limit
     58              Limits the used bandwidth, specified in Kbit/s.
     59 
     60      -o ssh_option
     61              Can be used to pass options to ssh in the format used in
     62              ssh_config(5).  This is useful for specifying options for which
     63              there is no separate scp command-line flag.  For full details of
     64              the options listed below, and their possible values, see
     65              ssh_config(5).
     66 
     67                    AddressFamily
     68                    BatchMode
     69                    BindAddress
     70                    CanonicalDomains
     71                    CanonicalizeFallbackLocal
     72                    CanonicalizeHostname
     73                    CanonicalizeMaxDots
     74                    CanonicalizePermittedCNAMEs
     75                    ChallengeResponseAuthentication
     76                    CheckHostIP
     77                    Cipher
     78                    Ciphers
     79                    Compression
     80                    CompressionLevel
     81                    ConnectionAttempts
     82                    ConnectTimeout
     83                    ControlMaster
     84                    ControlPath
     85                    ControlPersist
     86                    GlobalKnownHostsFile
     87                    GSSAPIAuthentication
     88                    GSSAPIDelegateCredentials
     89                    HashKnownHosts
     90                    Host
     91                    HostbasedAuthentication
     92                    HostbasedKeyTypes
     93                    HostKeyAlgorithms
     94                    HostKeyAlias
     95                    HostName
     96                    IdentityFile
     97                    IdentitiesOnly
     98                    IPQoS
     99                    KbdInteractiveAuthentication
    100                    KbdInteractiveDevices
    101                    KexAlgorithms
    102                    LogLevel
    103                    MACs
    104                    NoHostAuthenticationForLocalhost
    105                    NumberOfPasswordPrompts
    106                    PasswordAuthentication
    107                    PKCS11Provider
    108                    Port
    109                    PreferredAuthentications
    110                    Protocol
    111                    ProxyCommand
    112                    PubkeyAcceptedKeyTypes
    113                    PubkeyAuthentication
    114                    RekeyLimit
    115                    RhostsRSAAuthentication
    116                    RSAAuthentication
    117                    SendEnv
    118                    ServerAliveInterval
    119                    ServerAliveCountMax
    120                    StrictHostKeyChecking
    121                    TCPKeepAlive
    122                    UpdateHostKeys
    123                    UsePrivilegedPort
    124                    User
    125                    UserKnownHostsFile
    126                    VerifyHostKeyDNS
    127 
    128      -P port
    129              Specifies the port to connect to on the remote host.  Note that
    130              this option is written with a capital M-bM-^@M-^XPM-bM-^@M-^Y, because -p is already
    131              reserved for preserving the times and modes of the file.
    132 
    133      -p      Preserves modification times, access times, and modes from the
    134              original file.
    135 
    136      -q      Quiet mode: disables the progress meter as well as warning and
    137              diagnostic messages from ssh(1).
    138 
    139      -r      Recursively copy entire directories.  Note that scp follows
    140              symbolic links encountered in the tree traversal.
    141 
    142      -S program
    143              Name of program to use for the encrypted connection.  The program
    144              must understand ssh(1) options.
    145 
    146      -v      Verbose mode.  Causes scp and ssh(1) to print debugging messages
    147              about their progress.  This is helpful in debugging connection,
    148              authentication, and configuration problems.
    149 
    150 EXIT STATUS
    151      The scp utility exitsM-BM- 0 on success, andM-BM- >0 if an error occurs.
    152 
    153 SEE ALSO
    154      sftp(1), ssh(1), ssh-add(1), ssh-agent(1), ssh-keygen(1), ssh_config(5),
    155      sshd(8)
    156 
    157 HISTORY
    158      scp is based on the rcp program in BSD source code from the Regents of
    159      the University of California.
    160 
    161 AUTHORS
    162      Timo Rinne <tri (a] iki.fi>
    163      Tatu Ylonen <ylo (a] cs.hut.fi>
    164 
    165 OpenBSD 5.8                      July 10, 2015                     OpenBSD 5.8
    166