1SCP(1) BSD General Commands Manual SCP(1)
2
4 scp — secure copy (remote file copy program)
5
7 scp [-1246BCpqrv] [-c cipher] [-F ssh_config] [-i identity_file]
8 [-l limit] [-o ssh_option] [-P port] [-S program]
9 [[user@]host1:]file1 [...] [[user@]host2:]file2
10
12 scp copies files between hosts on a network. It uses ssh(1) for data
13 transfer, and uses the same authentication and provides the same security
14 as ssh(1). Unlike rcp(1), scp will ask for passwords or passphrases if
15 they are needed for authentication.
16
17 Any file name may contain a host and user specification to indicate that
18 the file is to be copied to/from that host. Copies between two remote
19 hosts are permitted.
20
21 The options are as follows:
22
23 -1 Forces scp to use protocol 1.
24
25 -2 Forces scp to use protocol 2.
26
27 -4 Forces scp to use IPv4 addresses only.
28
29 -6 Forces scp to use IPv6 addresses only.
30
31 -B Selects batch mode (prevents asking for passwords or
32 passphrases).
33
34 -C Compression enable. Passes the -C flag to ssh(1) to enable com‐
35 pression.
36
37 -c cipher
38 Selects the cipher to use for encrypting the data transfer. This
39 option is directly passed to ssh(1).
40
41 -F ssh_config
42 Specifies an alternative per-user configuration file for ssh.
43 This option is directly passed to ssh(1).
44
45 -i identity_file
46 Selects the file from which the identity (private key) for RSA
47 authentication is read. This option is directly passed to
48 ssh(1).
49
50 -l limit
51 Limits the used bandwidth, specified in Kbit/s.
52
53 -o ssh_option
54 Can be used to pass options to ssh in the format used in
55 ssh_config(5). This is useful for specifying options for which
56 there is no separate scp command-line flag. For full details of
57 the options listed below, and their possible values, see
58 ssh_config(5).
59
60 AddressFamily
61 BatchMode
62 BindAddress
63 ChallengeResponseAuthentication
64 CheckHostIP
65 Cipher
66 Ciphers
67 Compression
68 CompressionLevel
69 ConnectionAttempts
70 ConnectTimeout
71 ControlMaster
72 ControlPath
73 GlobalKnownHostsFile
74 GSSAPIAuthentication
75 GSSAPIDelegateCredentials
76 HashKnownHosts
77 Host
78 HostbasedAuthentication
79 HostKeyAlgorithms
80 HostKeyAlias
81 HostName
82 IdentityFile
83 IdentitiesOnly
84 KbdInteractiveDevices
85 LogLevel
86 MACs
87 NoHostAuthenticationForLocalhost
88 NumberOfPasswordPrompts
89 PasswordAuthentication
90 Port
91 PreferredAuthentications
92 Protocol
93 ProxyCommand
94 PubkeyAuthentication
95 RekeyLimit
96 RhostsRSAAuthentication
97 RSAAuthentication
98 SendEnv
99 ServerAliveInterval
100 ServerAliveCountMax
101 SmartcardDevice
102 StrictHostKeyChecking
103 TCPKeepAlive
104 UsePrivilegedPort
105 User
106 UserKnownHostsFile
107 VerifyHostKeyDNS
108
109 -P port
110 Specifies the port to connect to on the remote host. Note that
111 this option is written with a capital ‘P’, because -p is already
112 reserved for preserving the times and modes of the file in
113 rcp(1).
114
115 -p Preserves modification times, access times, and modes from the
116 original file.
117
118 -q Disables the progress meter.
119
120 -r Recursively copy entire directories.
121
122 -S program
123 Name of program to use for the encrypted connection. The program
124 must understand ssh(1) options.
125
126 -v Verbose mode. Causes scp and ssh(1) to print debugging messages
127 about their progress. This is helpful in debugging connection,
128 authentication, and configuration problems.
129
130 The scp utility exits 0 on success, and >0 if an error occurs.
131
133 rcp(1), sftp(1), ssh(1), ssh-add(1), ssh-agent(1), ssh-keygen(1),
134 ssh_config(5), sshd(8)
135
137 scp is based on the rcp(1) program in BSD source code from the Regents of
138 the University of California.
139
141 Timo Rinne <tri@iki.fi>
142 Tatu Ylonen <ylo@cs.hut.fi>
143
144BSD September 25, 1999 BSD