1 SCP(1) General Commands Manual SCP(1) 2 3 NAME 4 scp M-bM-^@M-^S secure copy (remote file copy program) 5 6 SYNOPSIS 7 scp [-12346BCpqrv] [-c cipher] [-F ssh_config] [-i identity_file] 8 [-l limit] [-o ssh_option] [-P port] [-S program] 9 [[user@]host1:]file1 ... [[user@]host2:]file2 10 11 DESCRIPTION 12 scp copies files between hosts on a network. It uses ssh(1) for data 13 transfer, and uses the same authentication and provides the same security 14 as ssh(1). scp will ask for passwords or passphrases if they are needed 15 for authentication. 16 17 File names may contain a user and host specification to indicate that the 18 file is to be copied to/from that host. Local file names can be made 19 explicit using absolute or relative pathnames to avoid scp treating file 20 names containing M-bM-^@M-^X:M-bM-^@M-^Y as host specifiers. Copies between two remote hosts 21 are also permitted. 22 23 The options are as follows: 24 25 -1 Forces scp to use protocol 1. 26 27 -2 Forces scp to use protocol 2. 28 29 -3 Copies between two remote hosts are transferred through the local 30 host. Without this option the data is copied directly between 31 the two remote hosts. Note that this option disables the 32 progress meter. 33 34 -4 Forces scp to use IPv4 addresses only. 35 36 -6 Forces scp to use IPv6 addresses only. 37 38 -B Selects batch mode (prevents asking for passwords or 39 passphrases). 40 41 -C Compression enable. Passes the -C flag to ssh(1) to enable 42 compression. 43 44 -c cipher 45 Selects the cipher to use for encrypting the data transfer. This 46 option is directly passed to ssh(1). 47 48 -F ssh_config 49 Specifies an alternative per-user configuration file for ssh. 50 This option is directly passed to ssh(1). 51 52 -i identity_file 53 Selects the file from which the identity (private key) for public 54 key authentication is read. This option is directly passed to 55 ssh(1). 56 57 -l limit 58 Limits the used bandwidth, specified in Kbit/s. 59 60 -o ssh_option 61 Can be used to pass options to ssh in the format used in 62 ssh_config(5). This is useful for specifying options for which 63 there is no separate scp command-line flag. For full details of 64 the options listed below, and their possible values, see 65 ssh_config(5). 66 67 AddressFamily 68 BatchMode 69 BindAddress 70 CanonicalDomains 71 CanonicalizeFallbackLocal 72 CanonicalizeHostname 73 CanonicalizeMaxDots 74 CanonicalizePermittedCNAMEs 75 ChallengeResponseAuthentication 76 CheckHostIP 77 Cipher 78 Ciphers 79 Compression 80 CompressionLevel 81 ConnectionAttempts 82 ConnectTimeout 83 ControlMaster 84 ControlPath 85 ControlPersist 86 GlobalKnownHostsFile 87 GSSAPIAuthentication 88 GSSAPIDelegateCredentials 89 HashKnownHosts 90 Host 91 HostbasedAuthentication 92 HostbasedKeyTypes 93 HostKeyAlgorithms 94 HostKeyAlias 95 HostName 96 IdentityFile 97 IdentitiesOnly 98 IPQoS 99 KbdInteractiveAuthentication 100 KbdInteractiveDevices 101 KexAlgorithms 102 LogLevel 103 MACs 104 NoHostAuthenticationForLocalhost 105 NumberOfPasswordPrompts 106 PasswordAuthentication 107 PKCS11Provider 108 Port 109 PreferredAuthentications 110 Protocol 111 ProxyCommand 112 PubkeyAcceptedKeyTypes 113 PubkeyAuthentication 114 RekeyLimit 115 RhostsRSAAuthentication 116 RSAAuthentication 117 SendEnv 118 ServerAliveInterval 119 ServerAliveCountMax 120 StrictHostKeyChecking 121 TCPKeepAlive 122 UpdateHostKeys 123 UsePrivilegedPort 124 User 125 UserKnownHostsFile 126 VerifyHostKeyDNS 127 128 -P port 129 Specifies the port to connect to on the remote host. Note that 130 this option is written with a capital M-bM-^@M-^XPM-bM-^@M-^Y, because -p is already 131 reserved for preserving the times and modes of the file. 132 133 -p Preserves modification times, access times, and modes from the 134 original file. 135 136 -q Quiet mode: disables the progress meter as well as warning and 137 diagnostic messages from ssh(1). 138 139 -r Recursively copy entire directories. Note that scp follows 140 symbolic links encountered in the tree traversal. 141 142 -S program 143 Name of program to use for the encrypted connection. The program 144 must understand ssh(1) options. 145 146 -v Verbose mode. Causes scp and ssh(1) to print debugging messages 147 about their progress. This is helpful in debugging connection, 148 authentication, and configuration problems. 149 150 EXIT STATUS 151 The scp utility exitsM-BM- 0 on success, andM-BM- >0 if an error occurs. 152 153 SEE ALSO 154 sftp(1), ssh(1), ssh-add(1), ssh-agent(1), ssh-keygen(1), ssh_config(5), 155 sshd(8) 156 157 HISTORY 158 scp is based on the rcp program in BSD source code from the Regents of 159 the University of California. 160 161 AUTHORS 162 Timo Rinne <tri (a] iki.fi> 163 Tatu Ylonen <ylo (a] cs.hut.fi> 164 165 OpenBSD 5.8 July 10, 2015 OpenBSD 5.8 166