5 .\" Author: Tatu Ylonen <ylo@cs.hut.fi>
7 .\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
8 .\" All rights reserved
10 .\" Created: Sun May 7 00:14:37 1995 ylo
12 .\" $OpenBSD: scp.1,v 1.49 2010/01/09 23:04:13 dtucker Exp $
14 .Dd $Mdocdate: January 9 2010 $
19 .Nd secure copy (remote file copy program)
25 .Op Fl F Ar ssh_config
26 .Op Fl i Ar identity_file
28 .Op Fl o Ar ssh_option
47 copies files between hosts on a network.
50 for data transfer, and uses the same authentication and provides the
56 will ask for passwords or passphrases if they are needed for
59 File names may contain a user and host specification to indicate
60 that the file is to be copied to/from that host.
61 Local file names can be made explicit using absolute or relative pathnames
64 treating file names containing
67 Copies between two remote hosts are also permitted.
69 The options are as follows:
82 to use IPv4 addresses only.
86 to use IPv6 addresses only.
88 Selects batch mode (prevents asking for passwords or passphrases).
95 to enable compression.
97 Selects the cipher to use for encrypting the data transfer.
98 This option is directly passed to
100 .It Fl F Ar ssh_config
101 Specifies an alternative
102 per-user configuration file for
104 This option is directly passed to
106 .It Fl i Ar identity_file
107 Selects the file from which the identity (private key) for public key
108 authentication is read.
109 This option is directly passed to
112 Limits the used bandwidth, specified in Kbit/s.
113 .It Fl o Ar ssh_option
114 Can be used to pass options to
116 in the format used in
118 This is useful for specifying options
119 for which there is no separate
122 For full details of the options listed below, and their possible values, see
125 .Bl -tag -width Ds -offset indent -compact
129 .It ChallengeResponseAuthentication
135 .It ConnectionAttempts
139 .It GlobalKnownHostsFile
140 .It GSSAPIAuthentication
141 .It GSSAPIDelegateCredentials
144 .It HostbasedAuthentication
145 .It HostKeyAlgorithms
150 .It KbdInteractiveDevices
153 .It NoHostAuthenticationForLocalhost
154 .It NumberOfPasswordPrompts
155 .It PasswordAuthentication
157 .It PreferredAuthentications
160 .It PubkeyAuthentication
162 .It RhostsRSAAuthentication
163 .It RSAAuthentication
165 .It ServerAliveInterval
166 .It ServerAliveCountMax
168 .It StrictHostKeyChecking
170 .It UsePrivilegedPort
172 .It UserKnownHostsFile
176 Specifies the port to connect to on the remote host.
177 Note that this option is written with a capital
181 is already reserved for preserving the times and modes of the file in
184 Preserves modification times, access times, and modes from the
187 Quiet mode: disables the progress meter as well as warning and diagnostic
191 Recursively copy entire directories.
194 follows symbolic links encountered in the tree traversal.
198 to use for the encrypted connection.
199 The program must understand
208 to print debugging messages about their progress.
210 debugging connection, authentication, and configuration problems.
227 program in BSD source code from the Regents of the University of
230 .An Timo Rinne Aq tri@iki.fi
231 .An Tatu Ylonen Aq ylo@cs.hut.fi