4 .\" Author: Tatu Ylonen <ylo@cs.hut.fi>
6 .\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
7 .\" All rights reserved
9 .\" Created: Sun May 7 00:14:37 1995 ylo
11 .\" $OpenBSD: scp.1,v 1.61 2013/10/20 09:51:26 djm Exp $
19 .Nd secure copy (remote file copy program)
25 .Op Fl F Ar ssh_config
26 .Op Fl i Ar identity_file
28 .Op Fl o Ar ssh_option
47 copies files between hosts on a network.
50 for data transfer, and uses the same authentication and provides the
56 will ask for passwords or passphrases if they are needed for
59 File names may contain a user and host specification to indicate
60 that the file is to be copied to/from that host.
61 Local file names can be made explicit using absolute or relative pathnames
64 treating file names containing
67 Copies between two remote hosts are also permitted.
69 The options are as follows:
80 Copies between two remote hosts are transferred through the local host.
81 Without this option the data is copied directly between the two remote
83 Note that this option disables the progress meter.
87 to use IPv4 addresses only.
91 to use IPv6 addresses only.
93 Selects batch mode (prevents asking for passwords or passphrases).
100 to enable compression.
102 Selects the cipher to use for encrypting the data transfer.
103 This option is directly passed to
105 .It Fl F Ar ssh_config
106 Specifies an alternative
107 per-user configuration file for
109 This option is directly passed to
111 .It Fl i Ar identity_file
112 Selects the file from which the identity (private key) for public key
113 authentication is read.
114 This option is directly passed to
117 Limits the used bandwidth, specified in Kbit/s.
118 .It Fl o Ar ssh_option
119 Can be used to pass options to
121 in the format used in
123 This is useful for specifying options
124 for which there is no separate
127 For full details of the options listed below, and their possible values, see
130 .Bl -tag -width Ds -offset indent -compact
135 .It CanonicalizeFallbackLocal
136 .It CanonicalizeHostname
137 .It CanonicalizeMaxDots
138 .It CanonicalizePermittedCNAMEs
139 .It ChallengeResponseAuthentication
145 .It ConnectionAttempts
150 .It GlobalKnownHostsFile
151 .It GSSAPIAuthentication
152 .It GSSAPIDelegateCredentials
155 .It HostbasedAuthentication
156 .It HostKeyAlgorithms
162 .It KbdInteractiveAuthentication
163 .It KbdInteractiveDevices
167 .It NoHostAuthenticationForLocalhost
168 .It NumberOfPasswordPrompts
169 .It PasswordAuthentication
172 .It PreferredAuthentications
175 .It PubkeyAuthentication
177 .It RhostsRSAAuthentication
178 .It RSAAuthentication
180 .It ServerAliveInterval
181 .It ServerAliveCountMax
182 .It StrictHostKeyChecking
184 .It UsePrivilegedPort
186 .It UserKnownHostsFile
190 Specifies the port to connect to on the remote host.
191 Note that this option is written with a capital
195 is already reserved for preserving the times and modes of the file in
198 Preserves modification times, access times, and modes from the
201 Quiet mode: disables the progress meter as well as warning and diagnostic
205 Recursively copy entire directories.
208 follows symbolic links encountered in the tree traversal.
212 to use for the encrypted connection.
213 The program must understand
222 to print debugging messages about their progress.
224 debugging connection, authentication, and configuration problems.
243 source code from the Regents of the University of California.
245 .An Timo Rinne Aq Mt tri@iki.fi
246 .An Tatu Ylonen Aq Mt ylo@cs.hut.fi