xref: /freebsd/crypto/openssh/scp.1 (revision 2f513db7)
1.\"
2.\" scp.1
3.\"
4.\" Author: Tatu Ylonen <ylo@cs.hut.fi>
5.\"
6.\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
7.\"                    All rights reserved
8.\"
9.\" Created: Sun May  7 00:14:37 1995 ylo
10.\"
11.\" $OpenBSD: scp.1,v 1.81 2018/09/20 06:58:48 jmc Exp $
12.\"
13.Dd $Mdocdate: September 20 2018 $
14.Dt SCP 1
15.Os
16.Sh NAME
17.Nm scp
18.Nd secure copy (remote file copy program)
19.Sh SYNOPSIS
20.Nm scp
21.Op Fl 346BCpqrTv
22.Op Fl c Ar cipher
23.Op Fl F Ar ssh_config
24.Op Fl i Ar identity_file
25.Op Fl l Ar limit
26.Op Fl o Ar ssh_option
27.Op Fl P Ar port
28.Op Fl S Ar program
29.Ar source ... target
30.Sh DESCRIPTION
31.Nm
32copies files between hosts on a network.
33It uses
34.Xr ssh 1
35for data transfer, and uses the same authentication and provides the
36same security as
37.Xr ssh 1 .
38.Nm
39will ask for passwords or passphrases if they are needed for
40authentication.
41.Pp
42The
43.Ar source
44and
45.Ar target
46may be specified as a local pathname, a remote host with optional path
47in the form
48.Sm off
49.Oo user @ Oc host : Op path ,
50.Sm on
51or a URI in the form
52.Sm off
53.No scp:// Oo user @ Oc host Oo : port Oc Op / path .
54.Sm on
55Local file names can be made explicit using absolute or relative pathnames
56to avoid
57.Nm
58treating file names containing
59.Sq :\&
60as host specifiers.
61.Pp
62When copying between two remote hosts, if the URI format is used, a
63.Ar port
64may only be specified on the
65.Ar target
66if the
67.Fl 3
68option is used.
69.Pp
70The options are as follows:
71.Bl -tag -width Ds
72.It Fl 3
73Copies between two remote hosts are transferred through the local host.
74Without this option the data is copied directly between the two remote
75hosts.
76Note that this option disables the progress meter.
77.It Fl 4
78Forces
79.Nm
80to use IPv4 addresses only.
81.It Fl 6
82Forces
83.Nm
84to use IPv6 addresses only.
85.It Fl B
86Selects batch mode (prevents asking for passwords or passphrases).
87.It Fl C
88Compression enable.
89Passes the
90.Fl C
91flag to
92.Xr ssh 1
93to enable compression.
94.It Fl c Ar cipher
95Selects the cipher to use for encrypting the data transfer.
96This option is directly passed to
97.Xr ssh 1 .
98.It Fl F Ar ssh_config
99Specifies an alternative
100per-user configuration file for
101.Nm ssh .
102This option is directly passed to
103.Xr ssh 1 .
104.It Fl i Ar identity_file
105Selects the file from which the identity (private key) for public key
106authentication is read.
107This option is directly passed to
108.Xr ssh 1 .
109.It Fl l Ar limit
110Limits the used bandwidth, specified in Kbit/s.
111.It Fl o Ar ssh_option
112Can be used to pass options to
113.Nm ssh
114in the format used in
115.Xr ssh_config 5 .
116This is useful for specifying options
117for which there is no separate
118.Nm scp
119command-line flag.
120For full details of the options listed below, and their possible values, see
121.Xr ssh_config 5 .
122.Pp
123.Bl -tag -width Ds -offset indent -compact
124.It AddressFamily
125.It BatchMode
126.It BindAddress
127.It BindInterface
128.It CanonicalDomains
129.It CanonicalizeFallbackLocal
130.It CanonicalizeHostname
131.It CanonicalizeMaxDots
132.It CanonicalizePermittedCNAMEs
133.It CASignatureAlgorithms
134.It CertificateFile
135.It ChallengeResponseAuthentication
136.It CheckHostIP
137.It Ciphers
138.It Compression
139.It ConnectionAttempts
140.It ConnectTimeout
141.It ControlMaster
142.It ControlPath
143.It ControlPersist
144.It GlobalKnownHostsFile
145.It GSSAPIAuthentication
146.It GSSAPIDelegateCredentials
147.It HashKnownHosts
148.It Host
149.It HostbasedAuthentication
150.It HostbasedKeyTypes
151.It HostKeyAlgorithms
152.It HostKeyAlias
153.It HostName
154.It IdentitiesOnly
155.It IdentityAgent
156.It IdentityFile
157.It IPQoS
158.It KbdInteractiveAuthentication
159.It KbdInteractiveDevices
160.It KexAlgorithms
161.It LogLevel
162.It MACs
163.It NoHostAuthenticationForLocalhost
164.It NumberOfPasswordPrompts
165.It PasswordAuthentication
166.It PKCS11Provider
167.It Port
168.It PreferredAuthentications
169.It ProxyCommand
170.It ProxyJump
171.It PubkeyAcceptedKeyTypes
172.It PubkeyAuthentication
173.It RekeyLimit
174.It SendEnv
175.It ServerAliveInterval
176.It ServerAliveCountMax
177.It SetEnv
178.It StrictHostKeyChecking
179.It TCPKeepAlive
180.It UpdateHostKeys
181.It User
182.It UserKnownHostsFile
183.It VerifyHostKeyDNS
184.El
185.It Fl P Ar port
186Specifies the port to connect to on the remote host.
187Note that this option is written with a capital
188.Sq P ,
189because
190.Fl p
191is already reserved for preserving the times and modes of the file.
192.It Fl p
193Preserves modification times, access times, and modes from the
194original file.
195.It Fl q
196Quiet mode: disables the progress meter as well as warning and diagnostic
197messages from
198.Xr ssh 1 .
199.It Fl r
200Recursively copy entire directories.
201Note that
202.Nm
203follows symbolic links encountered in the tree traversal.
204.It Fl S Ar program
205Name of
206.Ar program
207to use for the encrypted connection.
208The program must understand
209.Xr ssh 1
210options.
211.It Fl T
212Disable strict filename checking.
213By default when copying files from a remote host to a local directory
214.Nm
215checks that the received filenames match those requested on the command-line
216to prevent the remote end from sending unexpected or unwanted files.
217Because of differences in how various operating systems and shells interpret
218filename wildcards, these checks may cause wanted files to be rejected.
219This option disables these checks at the expense of fully trusting that
220the server will not send unexpected filenames.
221.It Fl v
222Verbose mode.
223Causes
224.Nm
225and
226.Xr ssh 1
227to print debugging messages about their progress.
228This is helpful in
229debugging connection, authentication, and configuration problems.
230.El
231.Sh EXIT STATUS
232.Ex -std scp
233.Sh SEE ALSO
234.Xr sftp 1 ,
235.Xr ssh 1 ,
236.Xr ssh-add 1 ,
237.Xr ssh-agent 1 ,
238.Xr ssh-keygen 1 ,
239.Xr ssh_config 5 ,
240.Xr sshd 8
241.Sh HISTORY
242.Nm
243is based on the rcp program in
244.Bx
245source code from the Regents of the University of California.
246.Sh AUTHORS
247.An Timo Rinne Aq Mt tri@iki.fi
248.An Tatu Ylonen Aq Mt ylo@cs.hut.fi
249