NAME scp2 - secure copy client SYNOPSIS scp2 [-D debug_level_spec] [-d ] [-p ] [-n ] [-u ] [-v ] [-h ] [-c cipher ] [-S ssh2-path] [-P ssh2-port] [-t ] [-f ] [-1 ] [-r ] [-B ] [-o ssh-option] [-i file] [[user@]host[#port]:]file ... [[user@]host[#port]:]file_or_dir DESCRIPTION Scp2 (Secure Copy) is used to copy files over the network securely. It uses ssh2 for data transfer and authentica- tion, and provides the same level of security as ssh2 . Unlike rcp, scp2 will ask for passwords or passphrases if they are needed for authentication. You can also use your public key for authentication. See ssh-agent2(1) and ssh- add2(1). Any filename may contain a host, user and port specification to indicate that the file is to be copied to/from that host. Copies between two remote hosts are permitted. ``file'' can contain globbing patterns. Read more about those from sshre- gex(1). OPTIONS -D debug_level_spec Print extensive debug information to stderr. debug_level_spec is a number between 0 and 99, where 99 specifies that all debug information should be displayed. -d With this option, scp2 will make sure that the destina- tion file is a directory. If not, scp2 will exit with an error message. -p Tells scp2 to preserve file attributes and timestamps. -n Makes scp2 show what operations would have been done, without actually copying any files. -u Makes scp2 remove source-files after copying. This makes scp2 work more like "mv" than "cp." -v Makes scp2 verbose. This is equal to specifying the`-D 2'-option. -h Display a short help. -c cipher Select the encryption algorithm that ssh2 will use. Multiple -c options are allowed. A single -c flag can have only one cipher. -S ssh2-path Specifies the path to ssh2 used in connecting. -o ssh-options Specifies options to give to ssh2. Use as with ssh2, see ssh2(1). -i file Specifies the identity file to give to ssh2. -P ssh2-port Specifies the remote port to ssh2 . Ports can also be defined on a file-to-file basis. See SYNOPSIS . -t or -f These options are reserved for scp1 compatibility mode. If they are used with scp2, it gives them as arguments to scp1 to handle the connection. -1 This option invokes scp1 with the given arguments. The ``-1'' is removed from the list, however, because scp1 does not understand this option. Because of this, this option has to be given as the first argument to scp2 and separated from other arguments. -r This option specifies that scp2 should copy directories recursively. Does not follow symbolic links. -B With this option, scp2 invokes, if need be, ssh2 with "BatchMode yes". EXAMPLES There are a couple of ways to use scp2. You can use it to copy files from your local system to a remote system: $ scp localfile user@remotehost:/dest/dir/for/file/ Or you can use it to copy files from a remote system locally: $ scp user@remotehost:/dir/for/file/remotefile /dest/dir/for/file INSTALLATION Scp2 uses ssh2 in network connections. Therefore it is not installed suid-root. Notice that subsystem `sftp-server' must be defined in sshd2(8)'s configuration file in the remote end for scp2 to work. AUTHORS SSH Communications Security Corp For more information, see http://www.ssh.com. SEE ALSO ssh2(1), sshd2(8), ssh-keygen2(1), ssh-agent2(1), ssh- add2(1), sftp(1) rlogin(1), rsh(1), telnet(1)
Закладки на сайте Проследить за страницей |
Created 1996-2024 by Maxim Chirkov Добавить, Поддержать, Вебмастеру |