1999-10-28 23:15:49 +00:00
|
|
|
.\"
|
|
|
|
.\" scp.1
|
|
|
|
.\"
|
|
|
|
.\" Author: Tatu Ylonen <ylo@cs.hut.fi>
|
|
|
|
.\"
|
|
|
|
.\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
|
|
|
|
.\" All rights reserved
|
|
|
|
.\"
|
|
|
|
.\" Created: Sun May 7 00:14:37 1995 ylo
|
|
|
|
.\"
|
2015-09-25 18:19:54 +00:00
|
|
|
.\" $OpenBSD: scp.1,v 1.68 2015/09/25 18:19:54 jmc Exp $
|
1999-10-28 23:15:49 +00:00
|
|
|
.\"
|
2015-09-25 18:19:54 +00:00
|
|
|
.Dd $Mdocdate: September 25 2015 $
|
1999-10-28 23:15:49 +00:00
|
|
|
.Dt SCP 1
|
|
|
|
.Os
|
|
|
|
.Sh NAME
|
|
|
|
.Nm scp
|
|
|
|
.Nd secure copy (remote file copy program)
|
|
|
|
.Sh SYNOPSIS
|
|
|
|
.Nm scp
|
2003-04-01 11:42:14 +00:00
|
|
|
.Bk -words
|
2011-01-06 11:40:30 +00:00
|
|
|
.Op Fl 12346BCpqrv
|
1999-10-28 23:15:49 +00:00
|
|
|
.Op Fl c Ar cipher
|
2003-10-15 05:50:42 +00:00
|
|
|
.Op Fl F Ar ssh_config
|
1999-10-28 23:15:49 +00:00
|
|
|
.Op Fl i Ar identity_file
|
2003-02-24 00:50:50 +00:00
|
|
|
.Op Fl l Ar limit
|
2001-08-15 23:25:46 +00:00
|
|
|
.Op Fl o Ar ssh_option
|
2003-10-15 05:50:42 +00:00
|
|
|
.Op Fl P Ar port
|
|
|
|
.Op Fl S Ar program
|
1999-10-28 23:15:49 +00:00
|
|
|
.Sm off
|
|
|
|
.Oo
|
2003-10-15 05:50:42 +00:00
|
|
|
.Op Ar user No @
|
2015-01-16 16:20:23 +00:00
|
|
|
.Ar host1 :
|
2011-09-22 11:34:56 +00:00
|
|
|
.Oc Ar file1
|
1999-10-28 23:15:49 +00:00
|
|
|
.Sm on
|
2007-08-08 04:29:58 +00:00
|
|
|
.Ar ...
|
1999-10-28 23:15:49 +00:00
|
|
|
.Sm off
|
|
|
|
.Oo
|
2003-10-15 05:50:42 +00:00
|
|
|
.Op Ar user No @
|
2015-01-16 16:20:23 +00:00
|
|
|
.Ar host2 :
|
1999-10-28 23:15:49 +00:00
|
|
|
.Oc Ar file2
|
|
|
|
.Sm on
|
2003-04-01 11:42:14 +00:00
|
|
|
.Ek
|
2000-04-13 02:26:34 +00:00
|
|
|
.Sh DESCRIPTION
|
1999-10-28 23:15:49 +00:00
|
|
|
.Nm
|
2000-03-26 03:04:51 +00:00
|
|
|
copies files between hosts on a network.
|
|
|
|
It uses
|
1999-10-28 23:15:49 +00:00
|
|
|
.Xr ssh 1
|
|
|
|
for data transfer, and uses the same authentication and provides the
|
|
|
|
same security as
|
|
|
|
.Xr ssh 1 .
|
|
|
|
.Nm
|
|
|
|
will ask for passwords or passphrases if they are needed for
|
|
|
|
authentication.
|
|
|
|
.Pp
|
2008-02-10 11:28:45 +00:00
|
|
|
File names may contain a user and host specification to indicate
|
2000-03-26 03:04:51 +00:00
|
|
|
that the file is to be copied to/from that host.
|
2008-02-10 11:28:45 +00:00
|
|
|
Local file names can be made explicit using absolute or relative pathnames
|
|
|
|
to avoid
|
|
|
|
.Nm
|
|
|
|
treating file names containing
|
|
|
|
.Sq :\&
|
|
|
|
as host specifiers.
|
|
|
|
Copies between two remote hosts are also permitted.
|
1999-10-28 23:15:49 +00:00
|
|
|
.Pp
|
|
|
|
The options are as follows:
|
|
|
|
.Bl -tag -width Ds
|
2003-10-15 05:50:42 +00:00
|
|
|
.It Fl 1
|
|
|
|
Forces
|
1999-10-28 23:15:49 +00:00
|
|
|
.Nm
|
2003-10-15 05:50:42 +00:00
|
|
|
to use protocol 1.
|
|
|
|
.It Fl 2
|
|
|
|
Forces
|
|
|
|
.Nm
|
|
|
|
to use protocol 2.
|
2011-01-06 11:40:30 +00:00
|
|
|
.It Fl 3
|
|
|
|
Copies between two remote hosts are transferred through the local host.
|
|
|
|
Without this option the data is copied directly between the two remote
|
|
|
|
hosts.
|
2011-01-06 11:41:21 +00:00
|
|
|
Note that this option disables the progress meter.
|
2003-10-15 05:50:42 +00:00
|
|
|
.It Fl 4
|
|
|
|
Forces
|
|
|
|
.Nm
|
|
|
|
to use IPv4 addresses only.
|
|
|
|
.It Fl 6
|
|
|
|
Forces
|
|
|
|
.Nm
|
|
|
|
to use IPv6 addresses only.
|
1999-10-28 23:15:49 +00:00
|
|
|
.It Fl B
|
|
|
|
Selects batch mode (prevents asking for passwords or passphrases).
|
|
|
|
.It Fl C
|
2000-03-26 03:04:51 +00:00
|
|
|
Compression enable.
|
|
|
|
Passes the
|
1999-10-28 23:15:49 +00:00
|
|
|
.Fl C
|
|
|
|
flag to
|
|
|
|
.Xr ssh 1
|
|
|
|
to enable compression.
|
2003-10-15 05:50:42 +00:00
|
|
|
.It Fl c Ar cipher
|
|
|
|
Selects the cipher to use for encrypting the data transfer.
|
|
|
|
This option is directly passed to
|
|
|
|
.Xr ssh 1 .
|
2001-09-18 05:38:44 +00:00
|
|
|
.It Fl F Ar ssh_config
|
|
|
|
Specifies an alternative
|
|
|
|
per-user configuration file for
|
|
|
|
.Nm ssh .
|
|
|
|
This option is directly passed to
|
|
|
|
.Xr ssh 1 .
|
2003-10-15 05:50:42 +00:00
|
|
|
.It Fl i Ar identity_file
|
2008-07-12 07:12:49 +00:00
|
|
|
Selects the file from which the identity (private key) for public key
|
2003-10-15 05:50:42 +00:00
|
|
|
authentication is read.
|
|
|
|
This option is directly passed to
|
|
|
|
.Xr ssh 1 .
|
|
|
|
.It Fl l Ar limit
|
|
|
|
Limits the used bandwidth, specified in Kbit/s.
|
|
|
|
.It Fl o Ar ssh_option
|
|
|
|
Can be used to pass options to
|
|
|
|
.Nm ssh
|
|
|
|
in the format used in
|
|
|
|
.Xr ssh_config 5 .
|
|
|
|
This is useful for specifying options
|
|
|
|
for which there is no separate
|
|
|
|
.Nm scp
|
|
|
|
command-line flag.
|
|
|
|
For full details of the options listed below, and their possible values, see
|
|
|
|
.Xr ssh_config 5 .
|
|
|
|
.Pp
|
|
|
|
.Bl -tag -width Ds -offset indent -compact
|
|
|
|
.It AddressFamily
|
|
|
|
.It BatchMode
|
|
|
|
.It BindAddress
|
2013-10-23 05:29:59 +00:00
|
|
|
.It CanonicalDomains
|
|
|
|
.It CanonicalizeFallbackLocal
|
|
|
|
.It CanonicalizeHostname
|
|
|
|
.It CanonicalizeMaxDots
|
|
|
|
.It CanonicalizePermittedCNAMEs
|
2015-09-25 18:19:54 +00:00
|
|
|
.It CertificateFile
|
2003-10-15 05:50:42 +00:00
|
|
|
.It ChallengeResponseAuthentication
|
|
|
|
.It CheckHostIP
|
|
|
|
.It Cipher
|
|
|
|
.It Ciphers
|
|
|
|
.It Compression
|
|
|
|
.It CompressionLevel
|
|
|
|
.It ConnectionAttempts
|
2004-05-02 23:19:03 +00:00
|
|
|
.It ConnectTimeout
|
2004-06-15 00:34:08 +00:00
|
|
|
.It ControlMaster
|
|
|
|
.It ControlPath
|
2011-09-22 11:34:15 +00:00
|
|
|
.It ControlPersist
|
2003-10-15 05:50:42 +00:00
|
|
|
.It GlobalKnownHostsFile
|
|
|
|
.It GSSAPIAuthentication
|
|
|
|
.It GSSAPIDelegateCredentials
|
2005-03-02 01:04:16 +00:00
|
|
|
.It HashKnownHosts
|
2003-10-15 05:50:42 +00:00
|
|
|
.It Host
|
|
|
|
.It HostbasedAuthentication
|
2015-01-30 11:43:14 +00:00
|
|
|
.It HostbasedKeyTypes
|
2003-10-15 05:50:42 +00:00
|
|
|
.It HostKeyAlgorithms
|
|
|
|
.It HostKeyAlias
|
|
|
|
.It HostName
|
|
|
|
.It IdentityFile
|
2004-03-08 12:12:36 +00:00
|
|
|
.It IdentitiesOnly
|
2010-11-20 04:21:03 +00:00
|
|
|
.It IPQoS
|
2011-09-22 11:34:15 +00:00
|
|
|
.It KbdInteractiveAuthentication
|
2004-11-05 09:22:00 +00:00
|
|
|
.It KbdInteractiveDevices
|
2010-09-24 12:16:03 +00:00
|
|
|
.It KexAlgorithms
|
2003-10-15 05:50:42 +00:00
|
|
|
.It LogLevel
|
|
|
|
.It MACs
|
|
|
|
.It NoHostAuthenticationForLocalhost
|
|
|
|
.It NumberOfPasswordPrompts
|
|
|
|
.It PasswordAuthentication
|
2010-02-11 22:21:02 +00:00
|
|
|
.It PKCS11Provider
|
2003-10-15 05:50:42 +00:00
|
|
|
.It Port
|
|
|
|
.It PreferredAuthentications
|
|
|
|
.It Protocol
|
|
|
|
.It ProxyCommand
|
2015-07-10 06:21:53 +00:00
|
|
|
.It PubkeyAcceptedKeyTypes
|
2003-10-15 05:50:42 +00:00
|
|
|
.It PubkeyAuthentication
|
2006-01-20 00:31:47 +00:00
|
|
|
.It RekeyLimit
|
2003-10-15 05:50:42 +00:00
|
|
|
.It RhostsRSAAuthentication
|
|
|
|
.It RSAAuthentication
|
2004-05-13 03:03:04 +00:00
|
|
|
.It SendEnv
|
2003-12-17 05:33:10 +00:00
|
|
|
.It ServerAliveInterval
|
|
|
|
.It ServerAliveCountMax
|
2003-10-15 05:50:42 +00:00
|
|
|
.It StrictHostKeyChecking
|
2003-12-17 05:31:10 +00:00
|
|
|
.It TCPKeepAlive
|
2015-01-26 12:16:36 +00:00
|
|
|
.It UpdateHostKeys
|
2015-01-26 13:55:29 +00:00
|
|
|
.It UsePrivilegedPort
|
2003-10-15 05:50:42 +00:00
|
|
|
.It User
|
|
|
|
.It UserKnownHostsFile
|
|
|
|
.It VerifyHostKeyDNS
|
|
|
|
.El
|
1999-10-28 23:15:49 +00:00
|
|
|
.It Fl P Ar port
|
2000-03-26 03:04:51 +00:00
|
|
|
Specifies the port to connect to on the remote host.
|
|
|
|
Note that this option is written with a capital
|
1999-10-28 23:15:49 +00:00
|
|
|
.Sq P ,
|
|
|
|
because
|
|
|
|
.Fl p
|
2014-04-20 03:02:58 +00:00
|
|
|
is already reserved for preserving the times and modes of the file.
|
2003-10-15 05:50:42 +00:00
|
|
|
.It Fl p
|
|
|
|
Preserves modification times, access times, and modes from the
|
|
|
|
original file.
|
|
|
|
.It Fl q
|
2008-02-10 11:22:29 +00:00
|
|
|
Quiet mode: disables the progress meter as well as warning and diagnostic
|
|
|
|
messages from
|
|
|
|
.Xr ssh 1 .
|
2003-10-15 05:50:42 +00:00
|
|
|
.It Fl r
|
|
|
|
Recursively copy entire directories.
|
2008-06-15 21:55:06 +00:00
|
|
|
Note that
|
|
|
|
.Nm
|
|
|
|
follows symbolic links encountered in the tree traversal.
|
2000-09-05 02:34:53 +00:00
|
|
|
.It Fl S Ar program
|
|
|
|
Name of
|
|
|
|
.Ar program
|
2000-10-14 05:23:11 +00:00
|
|
|
to use for the encrypted connection.
|
|
|
|
The program must understand
|
2000-08-23 00:46:23 +00:00
|
|
|
.Xr ssh 1
|
|
|
|
options.
|
2003-10-15 05:50:42 +00:00
|
|
|
.It Fl v
|
|
|
|
Verbose mode.
|
|
|
|
Causes
|
2000-01-14 04:45:46 +00:00
|
|
|
.Nm
|
2003-10-15 05:50:42 +00:00
|
|
|
and
|
|
|
|
.Xr ssh 1
|
|
|
|
to print debugging messages about their progress.
|
|
|
|
This is helpful in
|
|
|
|
debugging connection, authentication, and configuration problems.
|
2000-07-11 07:31:38 +00:00
|
|
|
.El
|
2010-09-10 01:17:54 +00:00
|
|
|
.Sh EXIT STATUS
|
2006-07-24 04:04:36 +00:00
|
|
|
.Ex -std scp
|
1999-10-28 23:15:49 +00:00
|
|
|
.Sh SEE ALSO
|
2001-02-04 12:20:18 +00:00
|
|
|
.Xr sftp 1 ,
|
1999-10-28 23:15:49 +00:00
|
|
|
.Xr ssh 1 ,
|
|
|
|
.Xr ssh-add 1 ,
|
|
|
|
.Xr ssh-agent 1 ,
|
|
|
|
.Xr ssh-keygen 1 ,
|
2002-06-23 00:34:37 +00:00
|
|
|
.Xr ssh_config 5 ,
|
1999-10-28 23:15:49 +00:00
|
|
|
.Xr sshd 8
|
2003-06-11 12:04:39 +00:00
|
|
|
.Sh HISTORY
|
|
|
|
.Nm
|
2014-04-20 03:02:58 +00:00
|
|
|
is based on the rcp program in
|
2013-08-20 16:43:49 +00:00
|
|
|
.Bx
|
|
|
|
source code from the Regents of the University of California.
|
2003-06-11 12:04:39 +00:00
|
|
|
.Sh AUTHORS
|
2013-07-18 06:14:13 +00:00
|
|
|
.An Timo Rinne Aq Mt tri@iki.fi
|
|
|
|
.An Tatu Ylonen Aq Mt ylo@cs.hut.fi
|