[BACK]Return to scp.1 CVS log [TXT][DIR] Up to [local] / src / usr.bin / ssh

Diff for /src/usr.bin/ssh/scp.1 between version 1.26 and 1.26.2.3

version 1.26, 2003/01/28 17:24:51 version 1.26.2.3, 2004/03/04 18:18:16
Line 19 
Line 19 
 .Nd secure copy (remote file copy program)  .Nd secure copy (remote file copy program)
 .Sh SYNOPSIS  .Sh SYNOPSIS
 .Nm scp  .Nm scp
 .Op Fl pqrvBC1246  .Bk -words
 .Op Fl F Ar ssh_config  .Op Fl 1246BCpqrv
 .Op Fl S Ar program  
 .Op Fl P Ar port  
 .Op Fl c Ar cipher  .Op Fl c Ar cipher
   .Op Fl F Ar ssh_config
 .Op Fl i Ar identity_file  .Op Fl i Ar identity_file
 .Op Fl l Ar limit  .Op Fl l Ar limit
 .Op Fl o Ar ssh_option  .Op Fl o Ar ssh_option
   .Op Fl P Ar port
   .Op Fl S Ar program
 .Sm off  .Sm off
 .Oo  .Oo
 .Op Ar user@  .Op Ar user No @
 .Ar host1 No :  .Ar host1 No :
 .Oc Ns Ar file1  .Oc Ns Ar file1
 .Sm on  .Sm on
 .Op Ar ...  .Op Ar ...
 .Sm off  .Sm off
 .Oo  .Oo
 .Op Ar user@  .Op Ar user No @
 .Ar host2 No :  .Ar host2 No :
 .Oc Ar file2  .Oc Ar file2
 .Sm on  .Sm on
   .Ek
 .Sh DESCRIPTION  .Sh DESCRIPTION
 .Nm  .Nm
 copies files between hosts on a network.  copies files between hosts on a network.
Line 60 
Line 62 
 .Pp  .Pp
 The options are as follows:  The options are as follows:
 .Bl -tag -width Ds  .Bl -tag -width Ds
 .It Fl c Ar cipher  .It Fl 1
 Selects the cipher to use for encrypting the data transfer.  Forces
 This option is directly passed to  
 .Xr ssh 1 .  
 .It Fl i Ar identity_file  
 Selects the file from which the identity (private key) for RSA  
 authentication is read.  
 This option is directly passed to  
 .Xr ssh 1 .  
 .It Fl l Ar limit  
 Limits the used bandwidth, specified in Kbit/s.  
 .It Fl p  
 Preserves modification times, access times, and modes from the  
 original file.  
 .It Fl r  
 Recursively copy entire directories.  
 .It Fl v  
 Verbose mode.  
 Causes  
 .Nm  .Nm
 and  to use protocol 1.
 .Xr ssh 1  .It Fl 2
 to print debugging messages about their progress.  Forces
 This is helpful in  .Nm
 debugging connection, authentication, and configuration problems.  to use protocol 2.
   .It Fl 4
   Forces
   .Nm
   to use IPv4 addresses only.
   .It Fl 6
   Forces
   .Nm
   to use IPv6 addresses only.
 .It Fl B  .It Fl B
 Selects batch mode (prevents asking for passwords or passphrases).  Selects batch mode (prevents asking for passwords or passphrases).
 .It Fl q  
 Disables the progress meter.  
 .It Fl C  .It Fl C
 Compression enable.  Compression enable.
 Passes the  Passes the
Line 96 
Line 87 
 flag to  flag to
 .Xr ssh 1  .Xr ssh 1
 to enable compression.  to enable compression.
   .It Fl c Ar cipher
   Selects the cipher to use for encrypting the data transfer.
   This option is directly passed to
   .Xr ssh 1 .
 .It Fl F Ar ssh_config  .It Fl F Ar ssh_config
 Specifies an alternative  Specifies an alternative
 per-user configuration file for  per-user configuration file for
 .Nm ssh .  .Nm ssh .
 This option is directly passed to  This option is directly passed to
 .Xr ssh 1 .  .Xr ssh 1 .
   .It Fl i Ar identity_file
   Selects the file from which the identity (private key) for RSA
   authentication is read.
   This option is directly passed to
   .Xr ssh 1 .
   .It Fl l Ar limit
   Limits the used bandwidth, specified in Kbit/s.
   .It Fl o Ar ssh_option
   Can be used to pass options to
   .Nm ssh
   in the format used in
   .Xr ssh_config 5 .
   This is useful for specifying options
   for which there is no separate
   .Nm scp
   command-line flag.
   For full details of the options listed below, and their possible values, see
   .Xr ssh_config 5 .
   .Pp
   .Bl -tag -width Ds -offset indent -compact
   .It AddressFamily
   .It BatchMode
   .It BindAddress
   .It ChallengeResponseAuthentication
   .It CheckHostIP
   .It Cipher
   .It Ciphers
   .It Compression
   .It CompressionLevel
   .It ConnectionAttempts
   .It ConnectionTimeout
   .It GlobalKnownHostsFile
   .It GSSAPIAuthentication
   .It GSSAPIDelegateCredentials
   .It Host
   .It HostbasedAuthentication
   .It HostKeyAlgorithms
   .It HostKeyAlias
   .It HostName
   .It IdentityFile
   .It LogLevel
   .It MACs
   .It NoHostAuthenticationForLocalhost
   .It NumberOfPasswordPrompts
   .It PasswordAuthentication
   .It Port
   .It PreferredAuthentications
   .It Protocol
   .It ProxyCommand
   .It PubkeyAuthentication
   .It RhostsRSAAuthentication
   .It RSAAuthentication
   .It ServerAliveInterval
   .It ServerAliveCountMax
   .It SmartcardDevice
   .It StrictHostKeyChecking
   .It TCPKeepAlive
   .It UsePrivilegedPort
   .It User
   .It UserKnownHostsFile
   .It VerifyHostKeyDNS
   .El
 .It Fl P Ar port  .It Fl P Ar port
 Specifies the port to connect to on the remote host.  Specifies the port to connect to on the remote host.
 Note that this option is written with a capital  Note that this option is written with a capital
Line 110 
Line 167 
 .Fl p  .Fl p
 is already reserved for preserving the times and modes of the file in  is already reserved for preserving the times and modes of the file in
 .Xr rcp 1 .  .Xr rcp 1 .
   .It Fl p
   Preserves modification times, access times, and modes from the
   original file.
   .It Fl q
   Disables the progress meter.
   .It Fl r
   Recursively copy entire directories.
 .It Fl S Ar program  .It Fl S Ar program
 Name of  Name of
 .Ar program  .Ar program
Line 117 
Line 181 
 The program must understand  The program must understand
 .Xr ssh 1  .Xr ssh 1
 options.  options.
 .It Fl o Ar ssh_option  .It Fl v
 Can be used to pass options to  Verbose mode.
 .Nm ssh  Causes
 in the format used in  
 .Xr ssh_config 5 .  
 This is useful for specifying options  
 for which there is no separate  
 .Nm scp  
 command-line flag.  
 .It Fl 1  
 Forces  
 .Nm  .Nm
 to use protocol 1.  and
 .It Fl 2  .Xr ssh 1
 Forces  to print debugging messages about their progress.
 .Nm  This is helpful in
 to use protocol 2.  debugging connection, authentication, and configuration problems.
 .It Fl 4  
 Forces  
 .Nm  
 to use IPv4 addresses only.  
 .It Fl 6  
 Forces  
 .Nm  
 to use IPv6 addresses only.  
 .El  .El
 .Sh DIAGNOSTICS  .Sh DIAGNOSTICS
 .Nm  .Nm
 exits with 0 on success or >0 if an error occurred.  exits with 0 on success or >0 if an error occurred.
 .Sh AUTHORS  
 Timo Rinne <tri@iki.fi> and Tatu Ylonen <ylo@cs.hut.fi>  
 .Sh HISTORY  
 .Nm  
 is based on the  
 .Xr rcp 1  
 program in BSD source code from the Regents of the University of  
 California.  
 .Sh SEE ALSO  .Sh SEE ALSO
 .Xr rcp 1 ,  .Xr rcp 1 ,
 .Xr sftp 1 ,  .Xr sftp 1 ,
Line 163 
Line 203 
 .Xr ssh-keygen 1 ,  .Xr ssh-keygen 1 ,
 .Xr ssh_config 5 ,  .Xr ssh_config 5 ,
 .Xr sshd 8  .Xr sshd 8
   .Sh HISTORY
   .Nm
   is based on the
   .Xr rcp 1
   program in BSD source code from the Regents of the University of
   California.
   .Sh AUTHORS
   .An Timo Rinne Aq tri@iki.fi
   .An Tatu Ylonen Aq ylo@cs.hut.fi

Legend:
Removed from v.1.26  
changed lines
  Added in v.1.26.2.3