4 .\" Author: Tatu Ylonen <ylo@cs.hut.fi>
6 .\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
7 .\" All rights reserved
9 .\" Created: Sun May 7 00:14:37 1995 ylo
11 .\" $OpenBSD: scp.1,v 1.80 2018/07/19 10:28:47 dtucker Exp $
13 .Dd $Mdocdate: July 19 2018 $
18 .Nd secure copy (remote file copy program)
23 .Op Fl F Ar ssh_config
24 .Op Fl i Ar identity_file
26 .Op Fl o Ar ssh_option
32 copies files between hosts on a network.
35 for data transfer, and uses the same authentication and provides the
39 will ask for passwords or passphrases if they are needed for
46 may be specified as a local pathname, a remote host with optional path
49 .Oo user @ Oc host : Op path ,
53 .No scp:// Oo user @ Oc host Oo : port Oc Op / path .
55 Local file names can be made explicit using absolute or relative pathnames
58 treating file names containing
62 When copying between two remote hosts, if the URI format is used, a
64 may only be specified on the
70 The options are as follows:
73 Copies between two remote hosts are transferred through the local host.
74 Without this option the data is copied directly between the two remote
76 Note that this option disables the progress meter.
80 to use IPv4 addresses only.
84 to use IPv6 addresses only.
86 Selects batch mode (prevents asking for passwords or passphrases).
93 to enable compression.
95 Selects the cipher to use for encrypting the data transfer.
96 This option is directly passed to
98 .It Fl F Ar ssh_config
99 Specifies an alternative
100 per-user configuration file for
102 This option is directly passed to
104 .It Fl i Ar identity_file
105 Selects the file from which the identity (private key) for public key
106 authentication is read.
107 This option is directly passed to
110 Limits the used bandwidth, specified in Kbit/s.
111 .It Fl o Ar ssh_option
112 Can be used to pass options to
114 in the format used in
116 This is useful for specifying options
117 for which there is no separate
120 For full details of the options listed below, and their possible values, see
123 .Bl -tag -width Ds -offset indent -compact
129 .It CanonicalizeFallbackLocal
130 .It CanonicalizeHostname
131 .It CanonicalizeMaxDots
132 .It CanonicalizePermittedCNAMEs
134 .It ChallengeResponseAuthentication
138 .It ConnectionAttempts
143 .It GlobalKnownHostsFile
144 .It GSSAPIAuthentication
145 .It GSSAPIDelegateCredentials
148 .It HostbasedAuthentication
149 .It HostbasedKeyTypes
150 .It HostKeyAlgorithms
157 .It KbdInteractiveAuthentication
158 .It KbdInteractiveDevices
162 .It NoHostAuthenticationForLocalhost
163 .It NumberOfPasswordPrompts
164 .It PasswordAuthentication
167 .It PreferredAuthentications
170 .It PubkeyAcceptedKeyTypes
171 .It PubkeyAuthentication
174 .It ServerAliveInterval
175 .It ServerAliveCountMax
177 .It StrictHostKeyChecking
181 .It UserKnownHostsFile
185 Specifies the port to connect to on the remote host.
186 Note that this option is written with a capital
190 is already reserved for preserving the times and modes of the file.
192 Preserves modification times, access times, and modes from the
195 Quiet mode: disables the progress meter as well as warning and diagnostic
199 Recursively copy entire directories.
202 follows symbolic links encountered in the tree traversal.
206 to use for the encrypted connection.
207 The program must understand
216 to print debugging messages about their progress.
218 debugging connection, authentication, and configuration problems.
232 is based on the rcp program in
234 source code from the Regents of the University of California.
236 .An Timo Rinne Aq Mt tri@iki.fi
237 .An Tatu Ylonen Aq Mt ylo@cs.hut.fi