1.\" -*- nroff -*- 2.\" 3.\" scp.1 4.\" 5.\" Author: Tatu Ylonen <ylo@cs.hut.fi> 6.\" 7.\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland 8.\" All rights reserved 9.\" 10.\" Created: Sun May 7 00:14:37 1995 ylo 11.\" 12.\" $OpenBSD: scp.1,v 1.21 2002/01/29 23:50:37 markus Exp $ 13.\" 14.Dd September 25, 1999 15.Dt SCP 1 16.Os 17.Sh NAME 18.Nm scp 19.Nd secure copy (remote file copy program) 20.Sh SYNOPSIS 21.Nm scp 22.Op Fl pqrvBC46 23.Op Fl F Ar ssh_config 24.Op Fl S Ar program 25.Op Fl P Ar port 26.Op Fl c Ar cipher 27.Op Fl i Ar identity_file 28.Op Fl o Ar ssh_option 29.Sm off 30.Oo 31.Op Ar user@ 32.Ar host1 No : 33.Oc Ns Ar file1 34.Sm on 35.Op Ar ... 36.Sm off 37.Oo 38.Op Ar user@ 39.Ar host2 No : 40.Oc Ar file2 41.Sm on 42.Sh DESCRIPTION 43.Nm 44copies files between hosts on a network. 45It uses 46.Xr ssh 1 47for data transfer, and uses the same authentication and provides the 48same security as 49.Xr ssh 1 . 50Unlike 51.Xr rcp 1 , 52.Nm 53will ask for passwords or passphrases if they are needed for 54authentication. 55.Pp 56Any file name may contain a host and user specification to indicate 57that the file is to be copied to/from that host. 58Copies between two remote hosts are permitted. 59.Pp 60The options are as follows: 61.Bl -tag -width Ds 62.It Fl c Ar cipher 63Selects the cipher to use for encrypting the data transfer. 64This option is directly passed to 65.Xr ssh 1 . 66.It Fl i Ar identity_file 67Selects the file from which the identity (private key) for RSA 68authentication is read. 69This option is directly passed to 70.Xr ssh 1 . 71.It Fl p 72Preserves modification times, access times, and modes from the 73original file. 74.It Fl r 75Recursively copy entire directories. 76.It Fl v 77Verbose mode. 78Causes 79.Nm 80and 81.Xr ssh 1 82to print debugging messages about their progress. 83This is helpful in 84debugging connection, authentication, and configuration problems. 85.It Fl B 86Selects batch mode (prevents asking for passwords or passphrases). 87.It Fl q 88Disables the progress meter. 89.It Fl C 90Compression enable. 91Passes the 92.Fl C 93flag to 94.Xr ssh 1 95to enable compression. 96.It Fl F Ar ssh_config 97Specifies an alternative 98per-user configuration file for 99.Nm ssh . 100This option is directly passed to 101.Xr ssh 1 . 102.It Fl P Ar port 103Specifies the port to connect to on the remote host. 104Note that this option is written with a capital 105.Sq P , 106because 107.Fl p 108is already reserved for preserving the times and modes of the file in 109.Xr rcp 1 . 110.It Fl S Ar program 111Name of 112.Ar program 113to use for the encrypted connection. 114The program must understand 115.Xr ssh 1 116options. 117.It Fl o Ar ssh_option 118Can be used to pass options to 119.Nm ssh 120in the format used in the 121.Xr ssh 1 122configuration file. This is useful for specifying options 123for which there is no separate 124.Nm scp 125command-line flag. For example, forcing the use of protocol 126version 1 is specified using 127.Ic scp -oProtocol=1 . 128.It Fl 4 129Forces 130.Nm 131to use IPv4 addresses only. 132.It Fl 6 133Forces 134.Nm 135to use IPv6 addresses only. 136.El 137.Sh DIAGNOSTICS 138.Nm 139exits with 0 on success or >0 if an error occurred. 140.Sh AUTHORS 141Timo Rinne <tri@iki.fi> and Tatu Ylonen <ylo@cs.hut.fi> 142.Sh HISTORY 143.Nm 144is based on the 145.Xr rcp 1 146program in BSD source code from the Regents of the University of 147California. 148.Sh SEE ALSO 149.Xr rcp 1 , 150.Xr sftp 1 , 151.Xr ssh 1 , 152.Xr ssh-add 1 , 153.Xr ssh-agent 1 , 154.Xr ssh-keygen 1 , 155.Xr sshd 8 156