4 .\" Author: Tatu Ylonen <ylo@cs.hut.fi>
6 .\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
7 .\" All rights reserved
9 .\" Created: Sun May 7 00:14:37 1995 ylo
11 .\" $OpenBSD: scp.1,v 1.74 2017/05/03 21:49:18 naddy Exp $
13 .Dd $Mdocdate: May 3 2017 $
18 .Nd secure copy (remote file copy program)
24 .Op Fl F Ar ssh_config
25 .Op Fl i Ar identity_file
27 .Op Fl o Ar ssh_option
46 copies files between hosts on a network.
49 for data transfer, and uses the same authentication and provides the
53 will ask for passwords or passphrases if they are needed for
56 File names may contain a user and host specification to indicate
57 that the file is to be copied to/from that host.
58 Local file names can be made explicit using absolute or relative pathnames
61 treating file names containing
64 Copies between two remote hosts are also permitted.
66 The options are as follows:
69 Copies between two remote hosts are transferred through the local host.
70 Without this option the data is copied directly between the two remote
72 Note that this option disables the progress meter.
76 to use IPv4 addresses only.
80 to use IPv6 addresses only.
82 Selects batch mode (prevents asking for passwords or passphrases).
89 to enable compression.
91 Selects the cipher to use for encrypting the data transfer.
92 This option is directly passed to
94 .It Fl F Ar ssh_config
95 Specifies an alternative
96 per-user configuration file for
98 This option is directly passed to
100 .It Fl i Ar identity_file
101 Selects the file from which the identity (private key) for public key
102 authentication is read.
103 This option is directly passed to
106 Limits the used bandwidth, specified in Kbit/s.
107 .It Fl o Ar ssh_option
108 Can be used to pass options to
110 in the format used in
112 This is useful for specifying options
113 for which there is no separate
116 For full details of the options listed below, and their possible values, see
119 .Bl -tag -width Ds -offset indent -compact
124 .It CanonicalizeFallbackLocal
125 .It CanonicalizeHostname
126 .It CanonicalizeMaxDots
127 .It CanonicalizePermittedCNAMEs
129 .It ChallengeResponseAuthentication
133 .It ConnectionAttempts
138 .It GlobalKnownHostsFile
139 .It GSSAPIAuthentication
140 .It GSSAPIDelegateCredentials
143 .It HostbasedAuthentication
144 .It HostbasedKeyTypes
145 .It HostKeyAlgorithms
152 .It KbdInteractiveAuthentication
153 .It KbdInteractiveDevices
157 .It NoHostAuthenticationForLocalhost
158 .It NumberOfPasswordPrompts
159 .It PasswordAuthentication
162 .It PreferredAuthentications
165 .It PubkeyAcceptedKeyTypes
166 .It PubkeyAuthentication
169 .It ServerAliveInterval
170 .It ServerAliveCountMax
171 .It StrictHostKeyChecking
174 .It UsePrivilegedPort
176 .It UserKnownHostsFile
180 Specifies the port to connect to on the remote host.
181 Note that this option is written with a capital
185 is already reserved for preserving the times and modes of the file.
187 Preserves modification times, access times, and modes from the
190 Quiet mode: disables the progress meter as well as warning and diagnostic
194 Recursively copy entire directories.
197 follows symbolic links encountered in the tree traversal.
201 to use for the encrypted connection.
202 The program must understand
211 to print debugging messages about their progress.
213 debugging connection, authentication, and configuration problems.
227 is based on the rcp program in
229 source code from the Regents of the University of California.
231 .An Timo Rinne Aq Mt tri@iki.fi
232 .An Tatu Ylonen Aq Mt ylo@cs.hut.fi