5 .\" Author: Tatu Ylonen <ylo@cs.hut.fi>
7 .\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
8 .\" All rights reserved
10 .\" Created: Sun May 7 00:14:37 1995 ylo
12 .\" $OpenBSD: scp.1,v 1.47 2009/10/28 16:38:18 reyk Exp $
14 .Dd $Mdocdate: October 28 2009 $
19 .Nd secure copy (remote file copy program)
25 .Op Fl F Ar ssh_config
26 .Op Fl i Ar identity_file
28 .Op Fl o Ar ssh_option
47 copies files between hosts on a network.
50 for data transfer, and uses the same authentication and provides the
56 will ask for passwords or passphrases if they are needed for
59 File names may contain a user and host specification to indicate
60 that the file is to be copied to/from that host.
61 Local file names can be made explicit using absolute or relative pathnames
64 treating file names containing
67 Copies between two remote hosts are also permitted.
69 The options are as follows:
82 to use IPv4 addresses only.
86 to use IPv6 addresses only.
88 Selects batch mode (prevents asking for passwords or passphrases).
95 to enable compression.
97 Selects the cipher to use for encrypting the data transfer.
98 This option is directly passed to
100 .It Fl F Ar ssh_config
101 Specifies an alternative
102 per-user configuration file for
104 This option is directly passed to
106 .It Fl i Ar identity_file
107 Selects the file from which the identity (private key) for public key
108 authentication is read.
109 This option is directly passed to
112 Limits the used bandwidth, specified in Kbit/s.
113 .It Fl o Ar ssh_option
114 Can be used to pass options to
116 in the format used in
118 This is useful for specifying options
119 for which there is no separate
122 For full details of the options listed below, and their possible values, see
125 .Bl -tag -width Ds -offset indent -compact
129 .It ChallengeResponseAuthentication
135 .It ConnectionAttempts
139 .It GlobalKnownHostsFile
140 .It GSSAPIAuthentication
141 .It GSSAPIDelegateCredentials
144 .It HostbasedAuthentication
145 .It HostKeyAlgorithms
150 .It KbdInteractiveDevices
153 .It NoHostAuthenticationForLocalhost
154 .It NumberOfPasswordPrompts
155 .It PasswordAuthentication
157 .It PreferredAuthentications
160 .It PubkeyAuthentication
163 .It RhostsRSAAuthentication
164 .It RSAAuthentication
166 .It ServerAliveInterval
167 .It ServerAliveCountMax
169 .It StrictHostKeyChecking
171 .It UsePrivilegedPort
173 .It UserKnownHostsFile
177 Specifies the port to connect to on the remote host.
178 Note that this option is written with a capital
182 is already reserved for preserving the times and modes of the file in
185 Preserves modification times, access times, and modes from the
188 Quiet mode: disables the progress meter as well as warning and diagnostic
192 Recursively copy entire directories.
195 follows symbolic links encountered in the tree traversal.
199 to use for the encrypted connection.
200 The program must understand
209 to print debugging messages about their progress.
211 debugging connection, authentication, and configuration problems.
228 program in BSD source code from the Regents of the University of
231 .An Timo Rinne Aq tri@iki.fi
232 .An Tatu Ylonen Aq ylo@cs.hut.fi