4 .\" Author: Tatu Ylonen <ylo@cs.hut.fi>
6 .\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
7 .\" All rights reserved
9 .\" Created: Sun May 7 00:14:37 1995 ylo
11 .\" $OpenBSD: scp.1,v 1.53 2010/10/28 18:33:28 jmc Exp $
13 .Dd $Mdocdate: October 28 2010 $
18 .Nd secure copy (remote file copy program)
24 .Op Fl F Ar ssh_config
25 .Op Fl i Ar identity_file
27 .Op Fl o Ar ssh_option
46 copies files between hosts on a network.
49 for data transfer, and uses the same authentication and provides the
55 will ask for passwords or passphrases if they are needed for
58 File names may contain a user and host specification to indicate
59 that the file is to be copied to/from that host.
60 Local file names can be made explicit using absolute or relative pathnames
63 treating file names containing
66 Copies between two remote hosts are also permitted.
68 The options are as follows:
81 to use IPv4 addresses only.
85 to use IPv6 addresses only.
87 Selects batch mode (prevents asking for passwords or passphrases).
94 to enable compression.
96 Selects the cipher to use for encrypting the data transfer.
97 This option is directly passed to
99 .It Fl F Ar ssh_config
100 Specifies an alternative
101 per-user configuration file for
103 This option is directly passed to
105 .It Fl i Ar identity_file
106 Selects the file from which the identity (private key) for public key
107 authentication is read.
108 This option is directly passed to
111 Limits the used bandwidth, specified in Kbit/s.
112 .It Fl o Ar ssh_option
113 Can be used to pass options to
115 in the format used in
117 This is useful for specifying options
118 for which there is no separate
121 For full details of the options listed below, and their possible values, see
124 .Bl -tag -width Ds -offset indent -compact
128 .It ChallengeResponseAuthentication
134 .It ConnectionAttempts
138 .It GlobalKnownHostsFile
139 .It GSSAPIAuthentication
140 .It GSSAPIDelegateCredentials
143 .It HostbasedAuthentication
144 .It HostKeyAlgorithms
149 .It KbdInteractiveDevices
153 .It NoHostAuthenticationForLocalhost
154 .It NumberOfPasswordPrompts
155 .It PasswordAuthentication
158 .It PreferredAuthentications
161 .It PubkeyAuthentication
163 .It RhostsRSAAuthentication
164 .It RSAAuthentication
166 .It ServerAliveInterval
167 .It ServerAliveCountMax
168 .It StrictHostKeyChecking
170 .It UsePrivilegedPort
172 .It UserKnownHostsFile
176 Specifies the port to connect to on the remote host.
177 Note that this option is written with a capital
181 is already reserved for preserving the times and modes of the file in
184 Preserves modification times, access times, and modes from the
187 Quiet mode: disables the progress meter as well as warning and diagnostic
191 Recursively copy entire directories.
194 follows symbolic links encountered in the tree traversal.
198 to use for the encrypted connection.
199 The program must understand
208 to print debugging messages about their progress.
210 debugging connection, authentication, and configuration problems.
227 program in BSD source code from the Regents of the University of
230 .An Timo Rinne Aq tri@iki.fi
231 .An Tatu Ylonen Aq ylo@cs.hut.fi