1999-10-29 03:15:49 +04:00
|
|
|
.\" -*- nroff -*-
|
|
|
|
.\"
|
|
|
|
.\" scp.1
|
|
|
|
.\"
|
|
|
|
.\" Author: Tatu Ylonen <ylo@cs.hut.fi>
|
|
|
|
.\"
|
|
|
|
.\" Copyright (c) 1995 Tatu Ylonen <ylo@cs.hut.fi>, Espoo, Finland
|
|
|
|
.\" All rights reserved
|
|
|
|
.\"
|
|
|
|
.\" Created: Sun May 7 00:14:37 1995 ylo
|
|
|
|
.\"
|
2000-08-23 04:46:23 +04:00
|
|
|
.\" $Id: scp.1,v 1.9 2000/08/23 00:46:24 djm Exp $
|
1999-10-29 03:15:49 +04:00
|
|
|
.\"
|
|
|
|
.Dd September 25, 1999
|
|
|
|
.Dt SCP 1
|
|
|
|
.Os
|
|
|
|
.Sh NAME
|
|
|
|
.Nm scp
|
|
|
|
.Nd secure copy (remote file copy program)
|
|
|
|
.Sh SYNOPSIS
|
|
|
|
.Nm scp
|
2000-01-14 07:45:46 +03:00
|
|
|
.Op Fl pqrvC46
|
1999-10-29 03:15:49 +04:00
|
|
|
.Op Fl P Ar port
|
|
|
|
.Op Fl c Ar cipher
|
|
|
|
.Op Fl i Ar identity_file
|
|
|
|
.Sm off
|
|
|
|
.Oo
|
|
|
|
.Op Ar user@
|
|
|
|
.Ar host1 No :
|
|
|
|
.Oc Ns Ar file1
|
|
|
|
.Sm on
|
|
|
|
.Op Ar ...
|
|
|
|
.Sm off
|
|
|
|
.Oo
|
|
|
|
.Op Ar user@
|
|
|
|
.Ar host2 No :
|
|
|
|
.Oc Ar file2
|
|
|
|
.Sm on
|
2000-04-13 06:26:34 +04:00
|
|
|
.Sh DESCRIPTION
|
1999-10-29 03:15:49 +04:00
|
|
|
.Nm
|
2000-03-26 07:04:51 +04:00
|
|
|
copies files between hosts on a network.
|
|
|
|
It uses
|
1999-10-29 03:15:49 +04:00
|
|
|
.Xr ssh 1
|
|
|
|
for data transfer, and uses the same authentication and provides the
|
|
|
|
same security as
|
|
|
|
.Xr ssh 1 .
|
|
|
|
Unlike
|
|
|
|
.Xr rcp 1 ,
|
|
|
|
.Nm
|
|
|
|
will ask for passwords or passphrases if they are needed for
|
|
|
|
authentication.
|
|
|
|
.Pp
|
|
|
|
Any file name may contain a host and user specification to indicate
|
2000-03-26 07:04:51 +04:00
|
|
|
that the file is to be copied to/from that host.
|
|
|
|
Copies between two remote hosts are permitted.
|
1999-10-29 03:15:49 +04:00
|
|
|
.Pp
|
|
|
|
The options are as follows:
|
|
|
|
.Bl -tag -width Ds
|
|
|
|
.It Fl c Ar cipher
|
2000-03-26 07:04:51 +04:00
|
|
|
Selects the cipher to use for encrypting the data transfer.
|
|
|
|
This option is directly passed to
|
1999-10-29 03:15:49 +04:00
|
|
|
.Xr ssh 1 .
|
|
|
|
.It Fl i Ar identity_file
|
|
|
|
Selects the file from which the identity (private key) for RSA
|
2000-03-26 07:04:51 +04:00
|
|
|
authentication is read.
|
|
|
|
This option is directly passed to
|
1999-10-29 03:15:49 +04:00
|
|
|
.Xr ssh 1 .
|
|
|
|
.It Fl p
|
|
|
|
Preserves modification times, access times, and modes from the
|
|
|
|
original file.
|
2000-08-23 04:46:23 +04:00
|
|
|
.It Fl S
|
|
|
|
Name of program to use for the encrypted connection.
|
|
|
|
The program must understand
|
|
|
|
.Xr ssh 1
|
|
|
|
options.
|
1999-10-29 03:15:49 +04:00
|
|
|
.It Fl r
|
|
|
|
Recursively copy entire directories.
|
|
|
|
.It Fl v
|
2000-03-26 07:04:51 +04:00
|
|
|
Verbose mode.
|
|
|
|
Causes
|
1999-10-29 03:15:49 +04:00
|
|
|
.Nm
|
2000-04-13 06:26:34 +04:00
|
|
|
and
|
1999-10-29 03:15:49 +04:00
|
|
|
.Xr ssh 1
|
2000-03-26 07:04:51 +04:00
|
|
|
to print debugging messages about their progress.
|
|
|
|
This is helpful in
|
1999-10-29 03:15:49 +04:00
|
|
|
debugging connection, authentication, and configuration problems.
|
|
|
|
.It Fl B
|
|
|
|
Selects batch mode (prevents asking for passwords or passphrases).
|
|
|
|
.It Fl q
|
|
|
|
Disables the progress meter.
|
|
|
|
.It Fl C
|
2000-03-26 07:04:51 +04:00
|
|
|
Compression enable.
|
|
|
|
Passes the
|
1999-10-29 03:15:49 +04:00
|
|
|
.Fl C
|
|
|
|
flag to
|
|
|
|
.Xr ssh 1
|
|
|
|
to enable compression.
|
|
|
|
.It Fl P Ar port
|
2000-03-26 07:04:51 +04:00
|
|
|
Specifies the port to connect to on the remote host.
|
|
|
|
Note that this option is written with a capital
|
1999-10-29 03:15:49 +04:00
|
|
|
.Sq P ,
|
|
|
|
because
|
|
|
|
.Fl p
|
|
|
|
is already reserved for preserving the times and modes of the file in
|
|
|
|
.Xr rcp 1 .
|
2000-08-23 04:46:23 +04:00
|
|
|
.It Fl S
|
|
|
|
Name of program to use for the encrypted connection. The program must
|
|
|
|
understand
|
|
|
|
.Xr ssh 1
|
|
|
|
options.
|
2000-01-14 07:45:46 +03:00
|
|
|
.It Fl 4
|
|
|
|
Forces
|
|
|
|
.Nm
|
|
|
|
to use IPv4 addresses only.
|
|
|
|
.It Fl 6
|
|
|
|
Forces
|
|
|
|
.Nm
|
|
|
|
to use IPv6 addresses only.
|
2000-07-11 11:31:38 +04:00
|
|
|
.El
|
1999-10-29 03:15:49 +04:00
|
|
|
.Sh AUTHORS
|
|
|
|
Timo Rinne <tri@iki.fi> and Tatu Ylonen <ylo@cs.hut.fi>
|
|
|
|
.Sh HISTORY
|
|
|
|
.Nm
|
|
|
|
is based on the
|
|
|
|
.Xr rcp 1
|
|
|
|
program in BSD source code from the Regents of the University of
|
|
|
|
California.
|
|
|
|
.Sh SEE ALSO
|
|
|
|
.Xr rcp 1 ,
|
|
|
|
.Xr ssh 1 ,
|
|
|
|
.Xr ssh-add 1 ,
|
|
|
|
.Xr ssh-agent 1 ,
|
|
|
|
.Xr ssh-keygen 1 ,
|
|
|
|
.Xr sshd 8
|