NAME
scp2 - secure copy client
SYNOPSIS
scp2 [-D debug_level_spec] [-d ] [-p ] [-n ] [-u ] [-v ] [-h
] [-c cipher ] [-S ssh2-path] [-P ssh2-port] [-t ] [-f ]
[-1 ] [-r ] [-B ] [-o ssh-option] [-i file]
[[user@]host[#port]:]file ...
[[user@]host[#port]:]file_or_dir
DESCRIPTION
Scp2 (Secure Copy) is used to copy files over the network
securely. It uses ssh2 for data transfer and authentica-
tion, and provides the same level of security as ssh2 .
Unlike rcp, scp2 will ask for passwords or passphrases if
they are needed for authentication. You can also use your
public key for authentication. See ssh-agent2(1) and ssh-
add2(1).
Any filename may contain a host, user and port specification
to indicate that the file is to be copied to/from that host.
Copies between two remote hosts are permitted. ``file'' can
contain globbing patterns. Read more about those from sshre-
gex(1).
OPTIONS
-D debug_level_spec
Print extensive debug information to stderr.
debug_level_spec is a number between 0 and 99, where 99
specifies that all debug information should be
displayed.
-d With this option, scp2 will make sure that the destina-
tion file is a directory. If not, scp2 will exit with
an error message.
-p Tells scp2 to preserve file attributes and timestamps.
-n Makes scp2 show what operations would have been done,
without actually copying any files.
-u Makes scp2 remove source-files after copying. This
makes scp2 work more like "mv" than "cp."
-v Makes scp2 verbose. This is equal to specifying the`-D
2'-option.
-h Display a short help.
-c cipher
Select the encryption algorithm that ssh2 will use.
Multiple -c options are allowed. A single -c flag can
have only one cipher.
-S ssh2-path
Specifies the path to ssh2 used in connecting.
-o ssh-options
Specifies options to give to ssh2. Use as with ssh2,
see ssh2(1).
-i file
Specifies the identity file to give to ssh2.
-P ssh2-port
Specifies the remote port to ssh2 . Ports can also be
defined on a file-to-file basis. See SYNOPSIS .
-t or -f
These options are reserved for scp1 compatibility mode.
If they are used with scp2, it gives them as arguments
to scp1 to handle the connection.
-1 This option invokes scp1 with the given arguments. The
``-1'' is removed from the list, however, because scp1
does not understand this option. Because of this, this
option has to be given as the first argument to scp2
and separated from other arguments.
-r This option specifies that scp2 should copy directories
recursively. Does not follow symbolic links.
-B With this option, scp2 invokes, if need be, ssh2 with
"BatchMode yes".
EXAMPLES
There are a couple of ways to use scp2. You can use it to
copy files from your local system to a remote system:
$ scp localfile user@remotehost:/dest/dir/for/file/
Or you can use it to copy files from a remote system
locally:
$ scp user@remotehost:/dir/for/file/remotefile /dest/dir/for/file
INSTALLATION
Scp2 uses ssh2 in network connections. Therefore it is not
installed suid-root. Notice that subsystem `sftp-server'
must be defined in sshd2(8)'s configuration file in the
remote end for scp2 to work.
AUTHORS
SSH Communications Security Corp
For more information, see http://www.ssh.com.
SEE ALSO
ssh2(1), sshd2(8), ssh-keygen2(1), ssh-agent2(1), ssh-
add2(1), sftp(1) rlogin(1), rsh(1), telnet(1)
|
Закладки на сайте Проследить за страницей |
Created 1996-2025 by Maxim Chirkov Добавить, Поддержать, Вебмастеру |