4 .\" Author: Tatu Ylonen <ylo@cs.hut.fi>
6 .\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
7 .\" All rights reserved
9 .\" Created: Sun May 7 00:14:37 1995 ylo
11 .\" $OpenBSD: scp.1,v 1.61 2013/10/20 09:51:26 djm Exp $
18 .Nd secure copy (remote file copy program)
24 .Op Fl F Ar ssh_config
25 .Op Fl i Ar identity_file
27 .Op Fl o Ar ssh_option
46 copies files between hosts on a network.
49 for data transfer, and uses the same authentication and provides the
55 will ask for passwords or passphrases if they are needed for
58 File names may contain a user and host specification to indicate
59 that the file is to be copied to/from that host.
60 Local file names can be made explicit using absolute or relative pathnames
63 treating file names containing
66 Copies between two remote hosts are also permitted.
68 The options are as follows:
79 Copies between two remote hosts are transferred through the local host.
80 Without this option the data is copied directly between the two remote
82 Note that this option disables the progress meter.
86 to use IPv4 addresses only.
90 to use IPv6 addresses only.
92 Selects batch mode (prevents asking for passwords or passphrases).
99 to enable compression.
101 Selects the cipher to use for encrypting the data transfer.
102 This option is directly passed to
104 .It Fl F Ar ssh_config
105 Specifies an alternative
106 per-user configuration file for
108 This option is directly passed to
110 .It Fl i Ar identity_file
111 Selects the file from which the identity (private key) for public key
112 authentication is read.
113 This option is directly passed to
116 Limits the used bandwidth, specified in Kbit/s.
117 .It Fl o Ar ssh_option
118 Can be used to pass options to
120 in the format used in
122 This is useful for specifying options
123 for which there is no separate
126 For full details of the options listed below, and their possible values, see
129 .Bl -tag -width Ds -offset indent -compact
134 .It CanonicalizeFallbackLocal
135 .It CanonicalizeHostname
136 .It CanonicalizeMaxDots
137 .It CanonicalizePermittedCNAMEs
138 .It ChallengeResponseAuthentication
144 .It ConnectionAttempts
149 .It GlobalKnownHostsFile
150 .It GSSAPIAuthentication
151 .It GSSAPIDelegateCredentials
154 .It HostbasedAuthentication
155 .It HostKeyAlgorithms
161 .It KbdInteractiveAuthentication
162 .It KbdInteractiveDevices
166 .It NoHostAuthenticationForLocalhost
167 .It NumberOfPasswordPrompts
168 .It PasswordAuthentication
171 .It PreferredAuthentications
174 .It PubkeyAuthentication
176 .It RhostsRSAAuthentication
177 .It RSAAuthentication
179 .It ServerAliveInterval
180 .It ServerAliveCountMax
181 .It StrictHostKeyChecking
183 .It UsePrivilegedPort
185 .It UserKnownHostsFile
189 Specifies the port to connect to on the remote host.
190 Note that this option is written with a capital
194 is already reserved for preserving the times and modes of the file in
197 Preserves modification times, access times, and modes from the
200 Quiet mode: disables the progress meter as well as warning and diagnostic
204 Recursively copy entire directories.
207 follows symbolic links encountered in the tree traversal.
211 to use for the encrypted connection.
212 The program must understand
221 to print debugging messages about their progress.
223 debugging connection, authentication, and configuration problems.
242 source code from the Regents of the University of California.
244 .An Timo Rinne Aq Mt tri@iki.fi
245 .An Tatu Ylonen Aq Mt ylo@cs.hut.fi