• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1SCP(1)                      General Commands Manual                     SCP(1)
2
3NAME
4     scp M-bM-^@M-^S secure copy (remote file copy program)
5
6SYNOPSIS
7     scp [-12346BCpqrv] [-c cipher] [-F ssh_config] [-i identity_file]
8         [-l limit] [-o ssh_option] [-P port] [-S program]
9         [[user@]host1:]file1 ... [[user@]host2:]file2
10
11DESCRIPTION
12     scp copies files between hosts on a network.  It uses ssh(1) for data
13     transfer, and uses the same authentication and provides the same security
14     as ssh(1).  scp will ask for passwords or passphrases if they are needed
15     for authentication.
16
17     File names may contain a user and host specification to indicate that the
18     file is to be copied to/from that host.  Local file names can be made
19     explicit using absolute or relative pathnames to avoid scp treating file
20     names containing M-bM-^@M-^X:M-bM-^@M-^Y as host specifiers.  Copies between two remote hosts
21     are also permitted.
22
23     The options are as follows:
24
25     -1      Forces scp to use protocol 1.
26
27     -2      Forces scp to use protocol 2.
28
29     -3      Copies between two remote hosts are transferred through the local
30             host.  Without this option the data is copied directly between
31             the two remote hosts.  Note that this option disables the
32             progress meter.
33
34     -4      Forces scp to use IPv4 addresses only.
35
36     -6      Forces scp to use IPv6 addresses only.
37
38     -B      Selects batch mode (prevents asking for passwords or
39             passphrases).
40
41     -C      Compression enable.  Passes the -C flag to ssh(1) to enable
42             compression.
43
44     -c cipher
45             Selects the cipher to use for encrypting the data transfer.  This
46             option is directly passed to ssh(1).
47
48     -F ssh_config
49             Specifies an alternative per-user configuration file for ssh.
50             This option is directly passed to ssh(1).
51
52     -i identity_file
53             Selects the file from which the identity (private key) for public
54             key authentication is read.  This option is directly passed to
55             ssh(1).
56
57     -l limit
58             Limits the used bandwidth, specified in Kbit/s.
59
60     -o ssh_option
61             Can be used to pass options to ssh in the format used in
62             ssh_config(5).  This is useful for specifying options for which
63             there is no separate scp command-line flag.  For full details of
64             the options listed below, and their possible values, see
65             ssh_config(5).
66
67                   AddressFamily
68                   BatchMode
69                   BindAddress
70                   CanonicalDomains
71                   CanonicalizeFallbackLocal
72                   CanonicalizeHostname
73                   CanonicalizeMaxDots
74                   CanonicalizePermittedCNAMEs
75                   ChallengeResponseAuthentication
76                   CheckHostIP
77                   Cipher
78                   Ciphers
79                   Compression
80                   CompressionLevel
81                   ConnectionAttempts
82                   ConnectTimeout
83                   ControlMaster
84                   ControlPath
85                   ControlPersist
86                   GlobalKnownHostsFile
87                   GSSAPIAuthentication
88                   GSSAPIDelegateCredentials
89                   HashKnownHosts
90                   Host
91                   HostbasedAuthentication
92                   HostbasedKeyTypes
93                   HostKeyAlgorithms
94                   HostKeyAlias
95                   HostName
96                   IdentityFile
97                   IdentitiesOnly
98                   IPQoS
99                   KbdInteractiveAuthentication
100                   KbdInteractiveDevices
101                   KexAlgorithms
102                   LogLevel
103                   MACs
104                   NoHostAuthenticationForLocalhost
105                   NumberOfPasswordPrompts
106                   PasswordAuthentication
107                   PKCS11Provider
108                   Port
109                   PreferredAuthentications
110                   Protocol
111                   ProxyCommand
112                   PubkeyAcceptedKeyTypes
113                   PubkeyAuthentication
114                   RekeyLimit
115                   RhostsRSAAuthentication
116                   RSAAuthentication
117                   SendEnv
118                   ServerAliveInterval
119                   ServerAliveCountMax
120                   StrictHostKeyChecking
121                   TCPKeepAlive
122                   UpdateHostKeys
123                   UsePrivilegedPort
124                   User
125                   UserKnownHostsFile
126                   VerifyHostKeyDNS
127
128     -P port
129             Specifies the port to connect to on the remote host.  Note that
130             this option is written with a capital M-bM-^@M-^XPM-bM-^@M-^Y, because -p is already
131             reserved for preserving the times and modes of the file.
132
133     -p      Preserves modification times, access times, and modes from the
134             original file.
135
136     -q      Quiet mode: disables the progress meter as well as warning and
137             diagnostic messages from ssh(1).
138
139     -r      Recursively copy entire directories.  Note that scp follows
140             symbolic links encountered in the tree traversal.
141
142     -S program
143             Name of program to use for the encrypted connection.  The program
144             must understand ssh(1) options.
145
146     -v      Verbose mode.  Causes scp and ssh(1) to print debugging messages
147             about their progress.  This is helpful in debugging connection,
148             authentication, and configuration problems.
149
150EXIT STATUS
151     The scp utility exitsM-BM- 0 on success, andM-BM- >0 if an error occurs.
152
153SEE ALSO
154     sftp(1), ssh(1), ssh-add(1), ssh-agent(1), ssh-keygen(1), ssh_config(5),
155     sshd(8)
156
157HISTORY
158     scp is based on the rcp program in BSD source code from the Regents of
159     the University of California.
160
161AUTHORS
162     Timo Rinne <tri@iki.fi>
163     Tatu Ylonen <ylo@cs.hut.fi>
164
165OpenBSD 5.8                      July 10, 2015                     OpenBSD 5.8
166