4 .\" Author: Tatu Ylonen <ylo@cs.hut.fi>
6 .\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
7 .\" All rights reserved
9 .\" Created: Sun May 7 00:14:37 1995 ylo
11 .\" $OpenBSD: scp.1,v 1.71 2016/07/16 06:57:55 jmc Exp $
13 .Dd $Mdocdate: July 16 2016 $
18 .Nd secure copy (remote file copy program)
24 .Op Fl F Ar ssh_config
25 .Op Fl i Ar identity_file
27 .Op Fl o Ar ssh_option
46 copies files between hosts on a network.
49 for data transfer, and uses the same authentication and provides the
53 will ask for passwords or passphrases if they are needed for
56 File names may contain a user and host specification to indicate
57 that the file is to be copied to/from that host.
58 Local file names can be made explicit using absolute or relative pathnames
61 treating file names containing
64 Copies between two remote hosts are also permitted.
66 The options are as follows:
77 Copies between two remote hosts are transferred through the local host.
78 Without this option the data is copied directly between the two remote
80 Note that this option disables the progress meter.
84 to use IPv4 addresses only.
88 to use IPv6 addresses only.
90 Selects batch mode (prevents asking for passwords or passphrases).
97 to enable compression.
99 Selects the cipher to use for encrypting the data transfer.
100 This option is directly passed to
102 .It Fl F Ar ssh_config
103 Specifies an alternative
104 per-user configuration file for
106 This option is directly passed to
108 .It Fl i Ar identity_file
109 Selects the file from which the identity (private key) for public key
110 authentication is read.
111 This option is directly passed to
114 Limits the used bandwidth, specified in Kbit/s.
115 .It Fl o Ar ssh_option
116 Can be used to pass options to
118 in the format used in
120 This is useful for specifying options
121 for which there is no separate
124 For full details of the options listed below, and their possible values, see
127 .Bl -tag -width Ds -offset indent -compact
132 .It CanonicalizeFallbackLocal
133 .It CanonicalizeHostname
134 .It CanonicalizeMaxDots
135 .It CanonicalizePermittedCNAMEs
137 .It ChallengeResponseAuthentication
143 .It ConnectionAttempts
148 .It GlobalKnownHostsFile
149 .It GSSAPIAuthentication
150 .It GSSAPIDelegateCredentials
153 .It HostbasedAuthentication
154 .It HostbasedKeyTypes
155 .It HostKeyAlgorithms
162 .It KbdInteractiveAuthentication
163 .It KbdInteractiveDevices
167 .It NoHostAuthenticationForLocalhost
168 .It NumberOfPasswordPrompts
169 .It PasswordAuthentication
172 .It PreferredAuthentications
176 .It PubkeyAcceptedKeyTypes
177 .It PubkeyAuthentication
179 .It RhostsRSAAuthentication
180 .It RSAAuthentication
182 .It ServerAliveInterval
183 .It ServerAliveCountMax
184 .It StrictHostKeyChecking
187 .It UsePrivilegedPort
189 .It UserKnownHostsFile
193 Specifies the port to connect to on the remote host.
194 Note that this option is written with a capital
198 is already reserved for preserving the times and modes of the file.
200 Preserves modification times, access times, and modes from the
203 Quiet mode: disables the progress meter as well as warning and diagnostic
207 Recursively copy entire directories.
210 follows symbolic links encountered in the tree traversal.
214 to use for the encrypted connection.
215 The program must understand
224 to print debugging messages about their progress.
226 debugging connection, authentication, and configuration problems.
240 is based on the rcp program in
242 source code from the Regents of the University of California.
244 .An Timo Rinne Aq Mt tri@iki.fi
245 .An Tatu Ylonen Aq Mt ylo@cs.hut.fi