1SCP(1)                    BSD General Commands Manual                   SCP(1)
2

NAME

4     scp — secure copy (remote file copy program)
5

SYNOPSIS

7     scp [-12346BCpqrv] [-c cipher] [-F ssh_config] [-i identity_file]
8         [-l limit] [-o ssh_option] [-P port] [-S program]
9         [[user@]host1:]file1 ... [[user@]host2:]file2
10

DESCRIPTION

12     scp copies files between hosts on a network.  It uses ssh(1) for data
13     transfer, and uses the same authentication and provides the same security
14     as ssh(1).  scp will ask for passwords or passphrases if they are needed
15     for authentication.
16
17     File names may contain a user and host specification to indicate that the
18     file is to be copied to/from that host.  Local file names can be made
19     explicit using absolute or relative pathnames to avoid scp treating file
20     names containing ‘:’ as host specifiers.  Copies between two remote hosts
21     are also permitted.
22
23     The options are as follows:
24
25     -1      Forces scp to use protocol 1.
26
27     -2      Forces scp to use protocol 2.
28
29     -3      Copies between two remote hosts are transferred through the local
30             host.  Without this option the data is copied directly between
31             the two remote hosts.  Note that this option disables the
32             progress meter.
33
34     -4      Forces scp to use IPv4 addresses only.
35
36     -6      Forces scp to use IPv6 addresses only.
37
38     -B      Selects batch mode (prevents asking for passwords or
39             passphrases).
40
41     -C      Compression enable.  Passes the -C flag to ssh(1) to enable com‐
42             pression.
43
44     -c cipher
45             Selects the cipher to use for encrypting the data transfer.  This
46             option is directly passed to ssh(1).
47
48     -F ssh_config
49             Specifies an alternative per-user configuration file for ssh.
50             This option is directly passed to ssh(1).
51
52     -i identity_file
53             Selects the file from which the identity (private key) for public
54             key authentication is read.  This option is directly passed to
55             ssh(1).
56
57     -l limit
58             Limits the used bandwidth, specified in Kbit/s.
59
60     -o ssh_option
61             Can be used to pass options to ssh in the format used in
62             ssh_config(5).  This is useful for specifying options for which
63             there is no separate scp command-line flag.  For full details of
64             the options listed below, and their possible values, see
65             ssh_config(5).
66
67                   AddressFamily
68                   BatchMode
69                   BindAddress
70                   CanonicalDomains
71                   CanonicalizeFallbackLocal
72                   CanonicalizeHostname
73                   CanonicalizeMaxDots
74                   CanonicalizePermittedCNAMEs
75                   CertificateFile
76                   ChallengeResponseAuthentication
77                   CheckHostIP
78                   Cipher
79                   Ciphers
80                   Compression
81                   CompressionLevel
82                   ConnectionAttempts
83                   ConnectTimeout
84                   ControlMaster
85                   ControlPath
86                   ControlPersist
87                   GlobalKnownHostsFile
88                   GSSAPIAuthentication
89                   GSSAPIDelegateCredentials
90                   HashKnownHosts
91                   Host
92                   HostbasedAuthentication
93                   HostbasedKeyTypes
94                   HostKeyAlgorithms
95                   HostKeyAlias
96                   HostName
97                   IdentitiesOnly
98                   IdentityAgent
99                   IdentityFile
100                   IPQoS
101                   KbdInteractiveAuthentication
102                   KbdInteractiveDevices
103                   KexAlgorithms
104                   LogLevel
105                   MACs
106                   NoHostAuthenticationForLocalhost
107                   NumberOfPasswordPrompts
108                   PasswordAuthentication
109                   PKCS11Provider
110                   Port
111                   PreferredAuthentications
112                   Protocol
113                   ProxyCommand
114                   ProxyJump
115                   PubkeyAcceptedKeyTypes
116                   PubkeyAuthentication
117                   RekeyLimit
118                   RhostsRSAAuthentication
119                   RSAAuthentication
120                   SendEnv
121                   ServerAliveInterval
122                   ServerAliveCountMax
123                   StrictHostKeyChecking
124                   TCPKeepAlive
125                   UpdateHostKeys
126                   UsePrivilegedPort
127                   User
128                   UserKnownHostsFile
129                   VerifyHostKeyDNS
130
131     -P port
132             Specifies the port to connect to on the remote host.  Note that
133             this option is written with a capital ‘P’, because -p is already
134             reserved for preserving the times and modes of the file.
135
136     -p      Preserves modification times, access times, and modes from the
137             original file.
138
139     -q      Quiet mode: disables the progress meter as well as warning and
140             diagnostic messages from ssh(1).
141
142     -r      Recursively copy entire directories.  Note that scp follows sym‐
143             bolic links encountered in the tree traversal.
144
145     -S program
146             Name of program to use for the encrypted connection.  The program
147             must understand ssh(1) options.
148
149     -v      Verbose mode.  Causes scp and ssh(1) to print debugging messages
150             about their progress.  This is helpful in debugging connection,
151             authentication, and configuration problems.
152

EXIT STATUS

154     The scp utility exits 0 on success, and >0 if an error occurs.
155

SEE ALSO

157     sftp(1), ssh(1), ssh-add(1), ssh-agent(1), ssh-keygen(1), ssh_config(5),
158     sshd(8)
159

HISTORY

161     scp is based on the rcp program in BSD source code from the Regents of
162     the University of California.
163

AUTHORS

165     Timo Rinne <tri@iki.fi>
166     Tatu Ylonen <ylo@cs.hut.fi>
167
168BSD                              June 21, 2019                             BSD
Impressum