secure copy (remote file copy program)


SUBMITTED BY: Guest

DATE: June 2, 2014, 2:43 p.m.

FORMAT: Text only

SIZE: 3.7 kB

HITS: 6253

  1. NAME
  2. scp - secure copy (remote file copy program)
  3. SYNOPSIS
  4. scp -words [-1246BCpqrv ] [-c cipher ] [-F ssh_config ] [-i identity_file ] [-l limit ] [-o ssh_option ] [-P port ] [-S program ] [[user @ ] host1 : file1 ] [... ] [[user @ ] host2 : file2 ]
  5. DESCRIPTION
  6. scp copies files between hosts on a network. It uses ssh(1) for data transfer, and uses the same authentication and provides the same security as ssh(1). Unlike rcp(1), scp will ask for passwords or passphrases if they are needed for authentication.
  7. Any file name may contain a host and user specification to indicate that the file is to be copied to/from that host. Copies between two remote hosts are permitted.
  8. The options are as follows:
  9. -1
  10. Forces scp to use protocol 1.
  11. -2
  12. Forces scp to use protocol 2.
  13. -4
  14. Forces scp to use IPv4 addresses only.
  15. -6
  16. Forces scp to use IPv6 addresses only.
  17. -B
  18. Selects batch mode (prevents asking for passwords or passphrases).
  19. -C
  20. Compression enable. Passes the -C flag to ssh(1) to enable compression.
  21. -c cipher
  22. Selects the cipher to use for encrypting the data transfer. This option is directly passed to ssh(1).
  23. -F ssh_config
  24. Specifies an alternative per-user configuration file for ssh This option is directly passed to ssh(1).
  25. -i identity_file
  26. Selects the file from which the identity (private key) for RSA authentication is read. This option is directly passed to ssh(1).
  27. -l limit
  28. Limits the used bandwidth, specified in Kbit/s.
  29. -o ssh_option
  30. Can be used to pass options to ssh in the format used in ssh_config5. This is useful for specifying options for which there is no separate scp command-line flag. For full details of the options listed below, and their possible values, see ssh_config5.
  31. AddressFamily
  32. BatchMode
  33. BindAddress
  34. ChallengeResponseAuthentication
  35. CheckHostIP
  36. Cipher
  37. Ciphers
  38. Compression
  39. CompressionLevel
  40. ConnectionAttempts
  41. ConnectTimeout
  42. ControlMaster
  43. ControlPath
  44. GlobalKnownHostsFile
  45. GSSAPIAuthentication
  46. GSSAPIDelegateCredentials
  47. Host
  48. HostbasedAuthentication
  49. HostKeyAlgorithms
  50. HostKeyAlias
  51. HostName
  52. IdentityFile
  53. IdentitiesOnly
  54. LogLevel
  55. MACs
  56. NoHostAuthenticationForLocalhost
  57. NumberOfPasswordPrompts
  58. PasswordAuthentication
  59. Port
  60. PreferredAuthentications
  61. Protocol
  62. ProxyCommand
  63. PubkeyAuthentication
  64. RhostsRSAAuthentication
  65. RSAAuthentication
  66. SendEnv
  67. ServerAliveInterval
  68. ServerAliveCountMax
  69. SmartcardDevice
  70. StrictHostKeyChecking
  71. TCPKeepAlive
  72. UsePrivilegedPort
  73. User
  74. UserKnownHostsFile
  75. VerifyHostKeyDNS
  76. -P port
  77. Specifies the port to connect to on the remote host. Note that this option is written with a capital `P' because -p is already reserved for preserving the times and modes of the file in rcp(1).
  78. -p
  79. Preserves modification times, access times, and modes from the original file.
  80. -q
  81. Disables the progress meter.
  82. -r
  83. Recursively copy entire directories.
  84. -S program
  85. Name of program to use for the encrypted connection. The program must understand ssh(1) options.
  86. -v
  87. Verbose mode. Causes scp and ssh(1) to print debugging messages about their progress. This is helpful in debugging connection, authentication, and configuration problems.
  88. DIAGNOSTICS
  89. scp exits with 0 on success or >0 if an error occurred.

comments powered by Disqus