man scp (Commandes) - scp
NAME
scp - secure copy (remote file copy program)
SYNOPSIS
scp [-1246BCpqrv] [-c cipher] [-F ssh_config] [-i identity_file] [-l limit] [-o ssh_option] [-P port] [-S program] [user No @]host1 No : [...] [user No @]host2 No :
DESCRIPTION
copies files between hosts on a network. It uses ssh() for data transfer, and uses the same authentication and provides the same security as ssh(1) . Unlike rcp(1) , will ask for passwords or passphrases if they are needed for authentication.
Any file name may contain a host and user specification to indicate that the file is to be copied to/from that host. Copies between two remote hosts are permitted.
The options are as follows:
- -1
- Forces to use protocol 1.
- -2
- Forces to use protocol 2.
- -4
- Forces to use IPv4 addresses only.
- -6
- Forces to use IPv6 addresses only.
- -B
- Selects batch mode (prevents asking for passwords or passphrases).
- -C
- Compression enable. Passes the -C flag to ssh() to enable compression.
- -c cipher
- Selects the cipher to use for encrypting the data transfer. This option is directly passed to ssh(1) .
- -F ssh_config
- Specifies an alternative per-user configuration file for ssh . This option is directly passed to ssh(1) .
- -i identity_file
- Selects the file from which the identity (private key) for RSA authentication is read. This option is directly passed to ssh(1) .
- -l limit
- Limits the used bandwidth, specified in Kbit/s.
- -o ssh_option
-
Can be used to pass options to
ssh
in the format used in
ssh_config(5)
.
This is useful for specifying options
for which there is no separate
scp
command-line flag.
For full details of the options listed below, and their possible values, see
ssh_config(5)
.
- AddressFamily
- BatchMode
- BindAddress
- ChallengeResponseAuthentication
- CheckHostIP
- Cipher
- Ciphers
- Compression
- CompressionLevel
- ConnectionAttempts
- ConnectTimeout
- ControlMaster
- ControlPath
- GlobalKnownHostsFile
- GSSAPIAuthentication
- GSSAPIDelegateCredentials
- HashKnownHosts
- Host
- HostbasedAuthentication
- HostKeyAlgorithms
- HostKeyAlias
- HostName
- IdentityFile
- IdentitiesOnly
- KbdInteractiveDevices
- LogLevel
- MACs
- NoHostAuthenticationForLocalhost
- NumberOfPasswordPrompts
- PasswordAuthentication
- Port
- PreferredAuthentications
- Protocol
- ProxyCommand
- PubkeyAuthentication
- RhostsRSAAuthentication
- RSAAuthentication
- SendEnv
- ServerAliveInterval
- ServerAliveCountMax
- SmartcardDevice
- StrictHostKeyChecking
- TCPKeepAlive
- UsePrivilegedPort
- User
- UserKnownHostsFile
- VerifyHostKeyDNS
- -P port
- Specifies the port to connect to on the remote host. Note that this option is written with a capital because -p is already reserved for preserving the times and modes of the file in rcp(1) .
- -p
- Preserves modification times, access times, and modes from the original file.
- -q
- Disables the progress meter.
- -r
- Recursively copy entire directories.
- -S program
- Name of program to use for the encrypted connection. The program must understand ssh() options.
- -v
- Verbose mode. Causes and ssh() to print debugging messages about their progress. This is helpful in debugging connection, authentication, and configuration problems.
DIAGNOSTICS
exits with 0 on success or >0 if an error occurred.
SEE ALSO
HISTORY
is based on the rcp() program in BSD source code from the Regents of the University of California.
AUTHORS
Timo Rinne Aq tri@iki.fi
Tatu Ylonen Aq ylo@cs.hut.fi