1.\" 2.\" scp.1 3.\" 4.\" Author: Tatu Ylonen <ylo@cs.hut.fi> 5.\" 6.\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland 7.\" All rights reserved 8.\" 9.\" Created: Sun May 7 00:14:37 1995 ylo 10.\" 11.\" $OpenBSD: scp.1,v 1.62 2014/03/19 14:42:44 tedu Exp $ 12.\" 13.Dd $Mdocdate: March 19 2014 $ 14.Dt SCP 1 15.Os 16.Sh NAME 17.Nm scp 18.Nd secure copy (remote file copy program) 19.Sh SYNOPSIS 20.Nm scp 21.Bk -words 22.Op Fl 12346BCpqrv 23.Op Fl c Ar cipher 24.Op Fl F Ar ssh_config 25.Op Fl i Ar identity_file 26.Op Fl l Ar limit 27.Op Fl o Ar ssh_option 28.Op Fl P Ar port 29.Op Fl S Ar program 30.Sm off 31.Oo 32.Op Ar user No @ 33.Ar host1 No : 34.Oc Ar file1 35.Sm on 36.Ar ... 37.Sm off 38.Oo 39.Op Ar user No @ 40.Ar host2 No : 41.Oc Ar file2 42.Sm on 43.Ek 44.Sh DESCRIPTION 45.Nm 46copies files between hosts on a network. 47It uses 48.Xr ssh 1 49for data transfer, and uses the same authentication and provides the 50same security as 51.Xr ssh 1 . 52.Nm 53will ask for passwords or passphrases if they are needed for 54authentication. 55.Pp 56File names may contain a user and host specification to indicate 57that the file is to be copied to/from that host. 58Local file names can be made explicit using absolute or relative pathnames 59to avoid 60.Nm 61treating file names containing 62.Sq :\& 63as host specifiers. 64Copies between two remote hosts are also permitted. 65.Pp 66The options are as follows: 67.Bl -tag -width Ds 68.It Fl 1 69Forces 70.Nm 71to use protocol 1. 72.It Fl 2 73Forces 74.Nm 75to use protocol 2. 76.It Fl 3 77Copies between two remote hosts are transferred through the local host. 78Without this option the data is copied directly between the two remote 79hosts. 80Note that this option disables the progress meter. 81.It Fl 4 82Forces 83.Nm 84to use IPv4 addresses only. 85.It Fl 6 86Forces 87.Nm 88to use IPv6 addresses only. 89.It Fl B 90Selects batch mode (prevents asking for passwords or passphrases). 91.It Fl C 92Compression enable. 93Passes the 94.Fl C 95flag to 96.Xr ssh 1 97to enable compression. 98.It Fl c Ar cipher 99Selects the cipher to use for encrypting the data transfer. 100This option is directly passed to 101.Xr ssh 1 . 102.It Fl F Ar ssh_config 103Specifies an alternative 104per-user configuration file for 105.Nm ssh . 106This option is directly passed to 107.Xr ssh 1 . 108.It Fl i Ar identity_file 109Selects the file from which the identity (private key) for public key 110authentication is read. 111This option is directly passed to 112.Xr ssh 1 . 113.It Fl l Ar limit 114Limits the used bandwidth, specified in Kbit/s. 115.It Fl o Ar ssh_option 116Can be used to pass options to 117.Nm ssh 118in the format used in 119.Xr ssh_config 5 . 120This is useful for specifying options 121for which there is no separate 122.Nm scp 123command-line flag. 124For full details of the options listed below, and their possible values, see 125.Xr ssh_config 5 . 126.Pp 127.Bl -tag -width Ds -offset indent -compact 128.It AddressFamily 129.It BatchMode 130.It BindAddress 131.It CanonicalDomains 132.It CanonicalizeFallbackLocal 133.It CanonicalizeHostname 134.It CanonicalizeMaxDots 135.It CanonicalizePermittedCNAMEs 136.It ChallengeResponseAuthentication 137.It CheckHostIP 138.It Cipher 139.It Ciphers 140.It Compression 141.It CompressionLevel 142.It ConnectionAttempts 143.It ConnectTimeout 144.It ControlMaster 145.It ControlPath 146.It ControlPersist 147.It GlobalKnownHostsFile 148.It GSSAPIAuthentication 149.It GSSAPIDelegateCredentials 150.It HashKnownHosts 151.It Host 152.It HostbasedAuthentication 153.It HostKeyAlgorithms 154.It HostKeyAlias 155.It HostName 156.It IdentityFile 157.It IdentitiesOnly 158.It IPQoS 159.It KbdInteractiveAuthentication 160.It KbdInteractiveDevices 161.It KexAlgorithms 162.It LogLevel 163.It MACs 164.It NoHostAuthenticationForLocalhost 165.It NumberOfPasswordPrompts 166.It PasswordAuthentication 167.It PKCS11Provider 168.It Port 169.It PreferredAuthentications 170.It Protocol 171.It ProxyCommand 172.It PubkeyAuthentication 173.It RekeyLimit 174.It RhostsRSAAuthentication 175.It RSAAuthentication 176.It SendEnv 177.It ServerAliveInterval 178.It ServerAliveCountMax 179.It StrictHostKeyChecking 180.It TCPKeepAlive 181.It UsePrivilegedPort 182.It User 183.It UserKnownHostsFile 184.It VerifyHostKeyDNS 185.El 186.It Fl P Ar port 187Specifies the port to connect to on the remote host. 188Note that this option is written with a capital 189.Sq P , 190because 191.Fl p 192is already reserved for preserving the times and modes of the file. 193.It Fl p 194Preserves modification times, access times, and modes from the 195original file. 196.It Fl q 197Quiet mode: disables the progress meter as well as warning and diagnostic 198messages from 199.Xr ssh 1 . 200.It Fl r 201Recursively copy entire directories. 202Note that 203.Nm 204follows symbolic links encountered in the tree traversal. 205.It Fl S Ar program 206Name of 207.Ar program 208to use for the encrypted connection. 209The program must understand 210.Xr ssh 1 211options. 212.It Fl v 213Verbose mode. 214Causes 215.Nm 216and 217.Xr ssh 1 218to print debugging messages about their progress. 219This is helpful in 220debugging connection, authentication, and configuration problems. 221.El 222.Sh EXIT STATUS 223.Ex -std scp 224.Sh SEE ALSO 225.Xr sftp 1 , 226.Xr ssh 1 , 227.Xr ssh-add 1 , 228.Xr ssh-agent 1 , 229.Xr ssh-keygen 1 , 230.Xr ssh_config 5 , 231.Xr sshd 8 232.Sh HISTORY 233.Nm 234is based on the rcp program in 235.Bx 236source code from the Regents of the University of California. 237.Sh AUTHORS 238.An Timo Rinne Aq Mt tri@iki.fi 239.An Tatu Ylonen Aq Mt ylo@cs.hut.fi 240