1.\" 2.\" scp.1 3.\" 4.\" Author: Tatu Ylonen <ylo@cs.hut.fi> 5.\" 6.\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland 7.\" All rights reserved 8.\" 9.\" Created: Sun May 7 00:14:37 1995 ylo 10.\" 11.\" $OpenBSD: scp.1,v 1.66 2015/01/30 11:43:14 djm Exp $ 12.\" 13.Dd $Mdocdate: January 30 2015 $ 14.Dt SCP 1 15.Os 16.Sh NAME 17.Nm scp 18.Nd secure copy (remote file copy program) 19.Sh SYNOPSIS 20.Nm scp 21.Bk -words 22.Op Fl 12346BCpqrv 23.Op Fl c Ar cipher 24.Op Fl F Ar ssh_config 25.Op Fl i Ar identity_file 26.Op Fl l Ar limit 27.Op Fl o Ar ssh_option 28.Op Fl P Ar port 29.Op Fl S Ar program 30.Sm off 31.Oo 32.Op Ar user No @ 33.Ar host1 : 34.Oc Ar file1 35.Sm on 36.Ar ... 37.Sm off 38.Oo 39.Op Ar user No @ 40.Ar host2 : 41.Oc Ar file2 42.Sm on 43.Ek 44.Sh DESCRIPTION 45.Nm 46copies files between hosts on a network. 47It uses 48.Xr ssh 1 49for data transfer, and uses the same authentication and provides the 50same security as 51.Xr ssh 1 . 52.Nm 53will ask for passwords or passphrases if they are needed for 54authentication. 55.Pp 56File names may contain a user and host specification to indicate 57that the file is to be copied to/from that host. 58Local file names can be made explicit using absolute or relative pathnames 59to avoid 60.Nm 61treating file names containing 62.Sq :\& 63as host specifiers. 64Copies between two remote hosts are also permitted. 65.Pp 66The options are as follows: 67.Bl -tag -width Ds 68.It Fl 1 69Forces 70.Nm 71to use protocol 1. 72.It Fl 2 73Forces 74.Nm 75to use protocol 2. 76.It Fl 3 77Copies between two remote hosts are transferred through the local host. 78Without this option the data is copied directly between the two remote 79hosts. 80Note that this option disables the progress meter. 81.It Fl 4 82Forces 83.Nm 84to use IPv4 addresses only. 85.It Fl 6 86Forces 87.Nm 88to use IPv6 addresses only. 89.It Fl B 90Selects batch mode (prevents asking for passwords or passphrases). 91.It Fl C 92Compression enable. 93Passes the 94.Fl C 95flag to 96.Xr ssh 1 97to enable compression. 98.It Fl c Ar cipher 99Selects the cipher to use for encrypting the data transfer. 100This option is directly passed to 101.Xr ssh 1 . 102.It Fl F Ar ssh_config 103Specifies an alternative 104per-user configuration file for 105.Nm ssh . 106This option is directly passed to 107.Xr ssh 1 . 108.It Fl i Ar identity_file 109Selects the file from which the identity (private key) for public key 110authentication is read. 111This option is directly passed to 112.Xr ssh 1 . 113.It Fl l Ar limit 114Limits the used bandwidth, specified in Kbit/s. 115.It Fl o Ar ssh_option 116Can be used to pass options to 117.Nm ssh 118in the format used in 119.Xr ssh_config 5 . 120This is useful for specifying options 121for which there is no separate 122.Nm scp 123command-line flag. 124For full details of the options listed below, and their possible values, see 125.Xr ssh_config 5 . 126.Pp 127.Bl -tag -width Ds -offset indent -compact 128.It AddressFamily 129.It BatchMode 130.It BindAddress 131.It CanonicalDomains 132.It CanonicalizeFallbackLocal 133.It CanonicalizeHostname 134.It CanonicalizeMaxDots 135.It CanonicalizePermittedCNAMEs 136.It ChallengeResponseAuthentication 137.It CheckHostIP 138.It Cipher 139.It Ciphers 140.It Compression 141.It CompressionLevel 142.It ConnectionAttempts 143.It ConnectTimeout 144.It ControlMaster 145.It ControlPath 146.It ControlPersist 147.It GlobalKnownHostsFile 148.It GSSAPIAuthentication 149.It GSSAPIDelegateCredentials 150.It HashKnownHosts 151.It Host 152.It HostbasedAuthentication 153.It HostbasedKeyTypes 154.It HostKeyAlgorithms 155.It HostKeyAlias 156.It HostName 157.It IdentityFile 158.It IdentitiesOnly 159.It IPQoS 160.It KbdInteractiveAuthentication 161.It KbdInteractiveDevices 162.It KexAlgorithms 163.It LogLevel 164.It MACs 165.It NoHostAuthenticationForLocalhost 166.It NumberOfPasswordPrompts 167.It PasswordAuthentication 168.It PKCS11Provider 169.It Port 170.It PreferredAuthentications 171.It Protocol 172.It ProxyCommand 173.It PubkeyAuthentication 174.It RekeyLimit 175.It RhostsRSAAuthentication 176.It RSAAuthentication 177.It SendEnv 178.It ServerAliveInterval 179.It ServerAliveCountMax 180.It StrictHostKeyChecking 181.It TCPKeepAlive 182.It UpdateHostKeys 183.It UsePrivilegedPort 184.It User 185.It UserKnownHostsFile 186.It VerifyHostKeyDNS 187.El 188.It Fl P Ar port 189Specifies the port to connect to on the remote host. 190Note that this option is written with a capital 191.Sq P , 192because 193.Fl p 194is already reserved for preserving the times and modes of the file. 195.It Fl p 196Preserves modification times, access times, and modes from the 197original file. 198.It Fl q 199Quiet mode: disables the progress meter as well as warning and diagnostic 200messages from 201.Xr ssh 1 . 202.It Fl r 203Recursively copy entire directories. 204Note that 205.Nm 206follows symbolic links encountered in the tree traversal. 207.It Fl S Ar program 208Name of 209.Ar program 210to use for the encrypted connection. 211The program must understand 212.Xr ssh 1 213options. 214.It Fl v 215Verbose mode. 216Causes 217.Nm 218and 219.Xr ssh 1 220to print debugging messages about their progress. 221This is helpful in 222debugging connection, authentication, and configuration problems. 223.El 224.Sh EXIT STATUS 225.Ex -std scp 226.Sh SEE ALSO 227.Xr sftp 1 , 228.Xr ssh 1 , 229.Xr ssh-add 1 , 230.Xr ssh-agent 1 , 231.Xr ssh-keygen 1 , 232.Xr ssh_config 5 , 233.Xr sshd 8 234.Sh HISTORY 235.Nm 236is based on the rcp program in 237.Bx 238source code from the Regents of the University of California. 239.Sh AUTHORS 240.An Timo Rinne Aq Mt tri@iki.fi 241.An Tatu Ylonen Aq Mt ylo@cs.hut.fi 242