1.\" -*- nroff -*- 2.\" 3.\" scp.1 4.\" 5.\" Author: Tatu Ylonen <ylo@cs.hut.fi> 6.\" 7.\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland 8.\" All rights reserved 9.\" 10.\" Created: Sun May 7 00:14:37 1995 ylo 11.\" 12.\" $OpenBSD: scp.1,v 1.32 2003/12/16 15:49:51 markus Exp $ 13.\" 14.Dd September 25, 1999 15.Dt SCP 1 16.Os 17.Sh NAME 18.Nm scp 19.Nd secure copy (remote file copy program) 20.Sh SYNOPSIS 21.Nm scp 22.Bk -words 23.Op Fl 1246BCpqrv 24.Op Fl c Ar cipher 25.Op Fl F Ar ssh_config 26.Op Fl i Ar identity_file 27.Op Fl l Ar limit 28.Op Fl o Ar ssh_option 29.Op Fl P Ar port 30.Op Fl S Ar program 31.Sm off 32.Oo 33.Op Ar user No @ 34.Ar host1 No : 35.Oc Ns Ar file1 36.Sm on 37.Op Ar ... 38.Sm off 39.Oo 40.Op Ar user No @ 41.Ar host2 No : 42.Oc Ar file2 43.Sm on 44.Ek 45.Sh DESCRIPTION 46.Nm 47copies files between hosts on a network. 48It uses 49.Xr ssh 1 50for data transfer, and uses the same authentication and provides the 51same security as 52.Xr ssh 1 . 53Unlike 54.Xr rcp 1 , 55.Nm 56will ask for passwords or passphrases if they are needed for 57authentication. 58.Pp 59Any file name may contain a host and user specification to indicate 60that the file is to be copied to/from that host. 61Copies between two remote hosts are permitted. 62.Pp 63The options are as follows: 64.Bl -tag -width Ds 65.It Fl 1 66Forces 67.Nm 68to use protocol 1. 69.It Fl 2 70Forces 71.Nm 72to use protocol 2. 73.It Fl 4 74Forces 75.Nm 76to use IPv4 addresses only. 77.It Fl 6 78Forces 79.Nm 80to use IPv6 addresses only. 81.It Fl B 82Selects batch mode (prevents asking for passwords or passphrases). 83.It Fl C 84Compression enable. 85Passes the 86.Fl C 87flag to 88.Xr ssh 1 89to enable compression. 90.It Fl c Ar cipher 91Selects the cipher to use for encrypting the data transfer. 92This option is directly passed to 93.Xr ssh 1 . 94.It Fl F Ar ssh_config 95Specifies an alternative 96per-user configuration file for 97.Nm ssh . 98This option is directly passed to 99.Xr ssh 1 . 100.It Fl i Ar identity_file 101Selects the file from which the identity (private key) for RSA 102authentication is read. 103This option is directly passed to 104.Xr ssh 1 . 105.It Fl l Ar limit 106Limits the used bandwidth, specified in Kbit/s. 107.It Fl o Ar ssh_option 108Can be used to pass options to 109.Nm ssh 110in the format used in 111.Xr ssh_config 5 . 112This is useful for specifying options 113for which there is no separate 114.Nm scp 115command-line flag. 116For full details of the options listed below, and their possible values, see 117.Xr ssh_config 5 . 118.Pp 119.Bl -tag -width Ds -offset indent -compact 120.It AddressFamily 121.It BatchMode 122.It BindAddress 123.It ChallengeResponseAuthentication 124.It CheckHostIP 125.It Cipher 126.It Ciphers 127.It Compression 128.It CompressionLevel 129.It ConnectionAttempts 130.It ConnectionTimeout 131.It GlobalKnownHostsFile 132.It GSSAPIAuthentication 133.It GSSAPIDelegateCredentials 134.It Host 135.It HostbasedAuthentication 136.It HostKeyAlgorithms 137.It HostKeyAlias 138.It HostName 139.It IdentityFile 140.It LogLevel 141.It MACs 142.It NoHostAuthenticationForLocalhost 143.It NumberOfPasswordPrompts 144.It PasswordAuthentication 145.It Port 146.It PreferredAuthentications 147.It Protocol 148.It ProxyCommand 149.It PubkeyAuthentication 150.It RhostsRSAAuthentication 151.It RSAAuthentication 152.It ServerAliveInterval 153.It ServerAliveCountMax 154.It SmartcardDevice 155.It StrictHostKeyChecking 156.It TCPKeepAlive 157.It UsePrivilegedPort 158.It User 159.It UserKnownHostsFile 160.It VerifyHostKeyDNS 161.El 162.It Fl P Ar port 163Specifies the port to connect to on the remote host. 164Note that this option is written with a capital 165.Sq P , 166because 167.Fl p 168is already reserved for preserving the times and modes of the file in 169.Xr rcp 1 . 170.It Fl p 171Preserves modification times, access times, and modes from the 172original file. 173.It Fl q 174Disables the progress meter. 175.It Fl r 176Recursively copy entire directories. 177.It Fl S Ar program 178Name of 179.Ar program 180to use for the encrypted connection. 181The program must understand 182.Xr ssh 1 183options. 184.It Fl v 185Verbose mode. 186Causes 187.Nm 188and 189.Xr ssh 1 190to print debugging messages about their progress. 191This is helpful in 192debugging connection, authentication, and configuration problems. 193.El 194.Sh DIAGNOSTICS 195.Nm 196exits with 0 on success or >0 if an error occurred. 197.Sh SEE ALSO 198.Xr rcp 1 , 199.Xr sftp 1 , 200.Xr ssh 1 , 201.Xr ssh-add 1 , 202.Xr ssh-agent 1 , 203.Xr ssh-keygen 1 , 204.Xr ssh_config 5 , 205.Xr sshd 8 206.Sh HISTORY 207.Nm 208is based on the 209.Xr rcp 1 210program in BSD source code from the Regents of the University of 211California. 212.Sh AUTHORS 213.An Timo Rinne Aq tri@iki.fi 214.An Tatu Ylonen Aq ylo@cs.hut.fi 215