1.\" 2.\" scp.1 3.\" 4.\" Author: Tatu Ylonen <ylo@cs.hut.fi> 5.\" 6.\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland 7.\" All rights reserved 8.\" 9.\" Created: Sun May 7 00:14:37 1995 ylo 10.\" 11.\" $OpenBSD: scp.1,v 1.85 2019/01/26 22:41:28 djm Exp $ 12.\" 13.Dd $Mdocdate: January 26 2019 $ 14.Dt SCP 1 15.Os 16.Sh NAME 17.Nm scp 18.Nd secure copy (remote file copy program) 19.Sh SYNOPSIS 20.Nm scp 21.Op Fl 346BCpqrTv 22.Op Fl c Ar cipher 23.Op Fl F Ar ssh_config 24.Op Fl i Ar identity_file 25.Op Fl J Ar destination 26.Op Fl l Ar limit 27.Op Fl o Ar ssh_option 28.Op Fl P Ar port 29.Op Fl S Ar program 30.Ar source ... target 31.Sh DESCRIPTION 32.Nm 33copies files between hosts on a network. 34It uses 35.Xr ssh 1 36for data transfer, and uses the same authentication and provides the 37same security as 38.Xr ssh 1 . 39.Nm 40will ask for passwords or passphrases if they are needed for 41authentication. 42.Pp 43The 44.Ar source 45and 46.Ar target 47may be specified as a local pathname, a remote host with optional path 48in the form 49.Sm off 50.Oo user @ Oc host : Op path , 51.Sm on 52or a URI in the form 53.Sm off 54.No scp:// Oo user @ Oc host Oo : port Oc Op / path . 55.Sm on 56Local file names can be made explicit using absolute or relative pathnames 57to avoid 58.Nm 59treating file names containing 60.Sq :\& 61as host specifiers. 62.Pp 63When copying between two remote hosts, if the URI format is used, a 64.Ar port 65may only be specified on the 66.Ar target 67if the 68.Fl 3 69option is used. 70.Pp 71The options are as follows: 72.Bl -tag -width Ds 73.It Fl 3 74Copies between two remote hosts are transferred through the local host. 75Without this option the data is copied directly between the two remote 76hosts. 77Note that this option disables the progress meter. 78.It Fl 4 79Forces 80.Nm 81to use IPv4 addresses only. 82.It Fl 6 83Forces 84.Nm 85to use IPv6 addresses only. 86.It Fl B 87Selects batch mode (prevents asking for passwords or passphrases). 88.It Fl C 89Compression enable. 90Passes the 91.Fl C 92flag to 93.Xr ssh 1 94to enable compression. 95.It Fl c Ar cipher 96Selects the cipher to use for encrypting the data transfer. 97This option is directly passed to 98.Xr ssh 1 . 99.It Fl F Ar ssh_config 100Specifies an alternative 101per-user configuration file for 102.Nm ssh . 103This option is directly passed to 104.Xr ssh 1 . 105.It Fl i Ar identity_file 106Selects the file from which the identity (private key) for public key 107authentication is read. 108This option is directly passed to 109.Xr ssh 1 . 110.It Fl J Ar destination 111Connect to the target host by first making an 112.Nm 113connection to the jump host described by 114.Ar destination 115and then establishing a TCP forwarding to the ultimate destination from 116there. 117Multiple jump hops may be specified separated by comma characters. 118This is a shortcut to specify a 119.Cm ProxyJump 120configuration directive. 121This option is directly passed to 122.Xr ssh 1 . 123.It Fl l Ar limit 124Limits the used bandwidth, specified in Kbit/s. 125.It Fl o Ar ssh_option 126Can be used to pass options to 127.Nm ssh 128in the format used in 129.Xr ssh_config 5 . 130This is useful for specifying options 131for which there is no separate 132.Nm scp 133command-line flag. 134For full details of the options listed below, and their possible values, see 135.Xr ssh_config 5 . 136.Pp 137.Bl -tag -width Ds -offset indent -compact 138.It AddressFamily 139.It BatchMode 140.It BindAddress 141.It BindInterface 142.It CanonicalDomains 143.It CanonicalizeFallbackLocal 144.It CanonicalizeHostname 145.It CanonicalizeMaxDots 146.It CanonicalizePermittedCNAMEs 147.It CASignatureAlgorithms 148.It CertificateFile 149.It ChallengeResponseAuthentication 150.It CheckHostIP 151.It Ciphers 152.It Compression 153.It ConnectionAttempts 154.It ConnectTimeout 155.It ControlMaster 156.It ControlPath 157.It ControlPersist 158.It GlobalKnownHostsFile 159.It GSSAPIAuthentication 160.It GSSAPIDelegateCredentials 161.It HashKnownHosts 162.It Host 163.It HostbasedAuthentication 164.It HostbasedKeyTypes 165.It HostKeyAlgorithms 166.It HostKeyAlias 167.It HostName 168.It IdentitiesOnly 169.It IdentityAgent 170.It IdentityFile 171.It IPQoS 172.It KbdInteractiveAuthentication 173.It KbdInteractiveDevices 174.It KexAlgorithms 175.It LogLevel 176.It MACs 177.It NoHostAuthenticationForLocalhost 178.It NumberOfPasswordPrompts 179.It PasswordAuthentication 180.It PKCS11Provider 181.It Port 182.It PreferredAuthentications 183.It ProxyCommand 184.It ProxyJump 185.It PubkeyAcceptedKeyTypes 186.It PubkeyAuthentication 187.It RekeyLimit 188.It SendEnv 189.It ServerAliveInterval 190.It ServerAliveCountMax 191.It SetEnv 192.It StrictHostKeyChecking 193.It TCPKeepAlive 194.It UpdateHostKeys 195.It User 196.It UserKnownHostsFile 197.It VerifyHostKeyDNS 198.El 199.It Fl P Ar port 200Specifies the port to connect to on the remote host. 201Note that this option is written with a capital 202.Sq P , 203because 204.Fl p 205is already reserved for preserving the times and modes of the file. 206.It Fl p 207Preserves modification times, access times, and modes from the 208original file. 209.It Fl q 210Quiet mode: disables the progress meter as well as warning and diagnostic 211messages from 212.Xr ssh 1 . 213.It Fl r 214Recursively copy entire directories. 215Note that 216.Nm 217follows symbolic links encountered in the tree traversal. 218.It Fl S Ar program 219Name of 220.Ar program 221to use for the encrypted connection. 222The program must understand 223.Xr ssh 1 224options. 225.It Fl T 226Disable strict filename checking. 227By default when copying files from a remote host to a local directory 228.Nm 229checks that the received filenames match those requested on the command-line 230to prevent the remote end from sending unexpected or unwanted files. 231Because of differences in how various operating systems and shells interpret 232filename wildcards, these checks may cause wanted files to be rejected. 233This option disables these checks at the expense of fully trusting that 234the server will not send unexpected filenames. 235.It Fl v 236Verbose mode. 237Causes 238.Nm 239and 240.Xr ssh 1 241to print debugging messages about their progress. 242This is helpful in 243debugging connection, authentication, and configuration problems. 244.El 245.Sh EXIT STATUS 246.Ex -std scp 247.Sh SEE ALSO 248.Xr sftp 1 , 249.Xr ssh 1 , 250.Xr ssh-add 1 , 251.Xr ssh-agent 1 , 252.Xr ssh-keygen 1 , 253.Xr ssh_config 5 , 254.Xr sshd 8 255.Sh HISTORY 256.Nm 257is based on the rcp program in 258.Bx 259source code from the Regents of the University of California. 260.Sh AUTHORS 261.An Timo Rinne Aq Mt tri@iki.fi 262.An Tatu Ylonen Aq Mt ylo@cs.hut.fi 263