ETC

rcp

MuGrammer 2012. 10. 29. 16:22

 rcp(1)                                                               rcp(1)


 NAME

      rcp - remote file copy


 SYNOPSIS

    Copy Single File

      rcp [-p] [-S size] [-R size] source_file1 dest_file


    Copy Multiple Files

      rcp [-p] [-S size] [-R size] source_file1 [source_file2]... dest_dir


    Copy One or More Directory Subtrees

      rcp [-p] [-S size] [-R size] -r source_dir1 [source_dir2]... dest_dir


    Copy Files and Directory Subtrees

      rcp [-p] [-S size] [-R size] -r file_or_dir1 [file_or_dir2]... dest_dir


    In Kerberos V5 Network Authentication Environments

    Copy Single File

      rcp [-k realm] [-P] [-p] [-S size] [-R size] source_file1 dest_file


    Copy Multiple Files

      rcp [-k realm] [-P] [-p] [-S size] [-R size] source_file1

      [source_file2]... dest_dir


    Copy One or More Directory Subtrees

      rcp [-k realm] [-P] [-p] [-S size] [-R size] -r source_dir1

      [source_dir2]... dest_dir


    Copy Files and Directory Subtrees

      rcp [-k realm] [-P] [-p] [-S size] [-R size] -r file_or_dir1

      [file_or_dir2]... dest_dir


 DESCRIPTION

      The rcp command copies files, directory subtrees, or a combination of

      files and directory subtrees from one or more systems to another.  In

      many respects, it is similar to the cp command (see cp(1)).


      To use rcp, you must have read access to files being copied, and read

      and search (execute) permission on all directories in the directory

      path. Note that there are special requirements for third-party

      transfers, which are described in the Third-Party Transfers section

      below.


      In a Kerberos V5 Network Authentication environment, rcp uses the

      Kerberos V5 protocol while initiating the connection to a remote host.

      The authorization mechanism is dependent on the command line options

      used to invoke remshd on the remote host (i.e., -K, -R, -r, or -k).

      Kerberos authentication and authorization rules are described in the

      Secure Internet Services man page, sis(5).


 Hewlett-Packard Company            - 1 -   HP-UX 11i Version 2: August 2003


 rcp(1)                                                               rcp(1)


      Although Kerberos authentication and authorizations may apply, the

      Kerberos mechanism is not applied when copying files. The files are

      still transferred in clear text over the network.


      The fallback option can be set in the krb5.conf file within

      appdefaults Section.  Refer to the krb5.conf(4) manpage for more

      information on the appdefaults Section.  If fallback is set to true

      and the kerberos authentication fails, rcp will use the non-secure

      mode of authentication.


           Note: Command line options override the configuration file

           options.


    Options and Arguments

      rcp recognizes the following options and arguments:


           source_file, source_dir

                          This option specifies the name of an existing file

                          or directory on a local or remote machine that you

                          want to be copied to a specified destination.  The

                          source file and directory names are constructed as

                          follows:


                               user_name@hostname:pathname/filename


                               or


                               user_name@hostname:pathname/dirname


                          Component parts of file and directory names are

                          described below.  If multiple existing files

                          and/or directory subtrees (source_file1,

                          source_file2, ..., etc.) are specified, then the

                          destination must be a directory.  Shell file name

                          expansion is allowed on both local and remote

                          systems.  Multiple files and directory subtrees

                          can be copied from one or more systems to a single

                          destination directory by using a single command.


           dest_file      This option specifies the name of the destination

                          file.  If host name and path name are not

                          specified, then the existing file is copied into a

                          file named dest_file in the current directory on

                          the local system.  If dest_file already exists and

                          is writable, then the existing file is

                          overwritten.  The destination file names are

                          constructed in the same way as source files except

                          that the usage of file name expansion characters

                          is forbidden in the case of destination file

                          names.


 Hewlett-Packard Company            - 2 -   HP-UX 11i Version 2: August 2003


 rcp(1)                                                               rcp(1)


           dest_dir       This option specifies the name of the destination

                          directory.  If host name and path names are not

                          specified, then the existing file is copied into a

                          directory named dest_dir in the current directory

                          on the local system.  If dest_dir already exists

                          in the specified directory path (or current

                          directory if not specified), then a new directory

                          named dest_dir is created underneath the existing

                          directory named dest_dir.  The destination

                          directory names are constructed the in same way as

                          source directory tree names except that the usage

                          of file name expansion characters is forbidden in

                          the case of destination directory names.


                          If the source_dir has more than one file to be

                          copied, the dest_dir does not exist, and if the -r

                          option is used for recursive copying, then rcp

                          first creates the dest_dir and later copies the

                          files under the source_dir to the dest_dir.


           file_or_dir    If a combination of files and directories are

                          specified for copying (either explicitly or by

                          file name expansion), then only files are copied

                          unless the -r option is specified.  If the -r

                          option is present, then all the files and

                          directory subtrees whose names match the specified

                          file_or_dir name are copied.


           -k realm       This option is applicable only in a secure

                          environment based on Kerberos V5.  It can be used

                          to obtain tickets from the remote host in the

                          specified realm instead of the remote host's

                          default realm as specified in the configuration

                          file krb.realms.


           -P             This option is applicable only in a secure

                          environment based on Kerberos V5.  It disables

                          Kerberos authentication.  If the remote host has

                          been configured to prevent non-secure access,

                          using this option would result in the generic

                          error,


                             krcmd: connect: hostname: Connection refused


                          See DIAGNOSTICS in remshd(1M) for more details.


           -p             This option can be used to preserve (duplicate)

                          modification times and modes (permissions) of

                          source files, ignoring the current setting of the

                          umask file creation mode mask.  If this option is

                          specified, rcp preserves the sticky bit only if


 Hewlett-Packard Company            - 3 -   HP-UX 11i Version 2: August 2003


 rcp(1)                                                               rcp(1)


                          the target user is superuser.


                          If the -p option is not specified, rcp preserves

                          the mode and owner of dest_file if it already

                          exists; otherwise rcp uses the mode of the source

                          file modified by the umask on the destination

                          host.  Modification and access times of the

                          destination file are set to the time when the copy

                          was made.


           -S size        This option sets the size of the socket send

                          buffer.


           -R size        This option sets the size of the socket receive

                          buffer.


           -r             This option can be used to recursively copy

                          directory subtrees rooted at the source directory

                          name.  If any directory subtrees are to be copied,

                          rcp recursively copies each subtree rooted at the

                          specified source directory name to directory

                          dest_dir.  If source_dir is being copied to an

                          existing directory of the same name, rcp creates a

                          new directory source_dir within dest_dir and

                          copies the subtree rooted at source_dir to

                          dest_dir/source_dir.  If dest_dir does not exist,

                          rcp first creates it and copies the subtree rooted

                          at source_dir to dest_dir and the output will be

                          similar irrespective of whether a wildcard

                          character (source_dir/*) is used for copying or

                          otherwise.


    Constructing File and Directory Names

      As indicated above, file and directory names contain one, two, or four

      component parts:


           user_name    Login name to be used for accessing directories and

                        files on remote system.


           hostname     Hostname of remote system where directories and

                        files are located.


           pathname     Absolute directory path name or directory path name

                        relative to the login directory of user user_name.


           filename     Actual name of source or destination file.  File

                        name expansion is allowed on source file names.


           dirname      Actual name of source or destination directory

                        subtree.  File name expansion is allowed on source

                        directory names.


 Hewlett-Packard Company            - 4 -   HP-UX 11i Version 2: August 2003


 rcp(1)                                                               rcp(1)


      Each file or directory argument is either a remote file name of the

      form hostname:path, or a local file name (with a slash (/) before any

      colon (:)).  hostname can be either an official host name or an alias

      (see hosts(4)).  If hostname is of the form ruser@rhost, ruser is used

      on the remote host instead of the current user name.  An unspecified

      path (that is, hostname:) refers to the remote user's login directory.

      If path does not begin with /, it is interpreted relative to the

      remote user's login directory on hostname.  Shell metacharacters in

      remote paths can be quoted with backslash (\), single quotes (''), or

      double quotes (""), so that they will be interpreted remotely.


      rcp does not prompt for passwords.  In a non-secure or traditional

      environment, user authorization is checked by determining if the

      current local user name or any user name specified via ruser exists on

      rhost.  In a Kerberos V5 Network Authentication or secure environment,

      the authorization method is dependent upon the command line options

      for remshd (see remshd(1M) for details).  In either case, remote

      command execution via remsh(1) and rcmd(3N), or rcmd_af(3N) in case of

      IPv6 systems, must be allowed and remshd(1M) must be executable on the

      remote host.


    Third-Party Transfers

      Third-party transfers in the following form:


           rcp ruser1@rhost1:path1 ruser2@rhost2:path2


      are performed as:


           remsh rhost1 -l ruser1 rcp path1 ruser2@rhost2:path2


      Therefore, for a such a transfer to succeed, ruser2 on rhost2 must

      allow access by ruser1 from rhost1 (see hosts.equiv(4)).


    rcp With IPv6 Address

      To invoke rcp with an IPv6 address, the IPv6 address must be enclosed

      in a pair of square brackets ([ and ]) as shown in the example below.


      rcp source user@[IPv6_address]:dest


      If the IPv6 address is not enclosed within square brackets, the first

      occurrence of a colon (:) is treated as the separator between the

      hostname and the path.


 WARNINGS

      The rcp routine is confused by any output generated by commands in a

      .cshrc file on the remote host (see csh(1)).


      Copying a file onto itself, for example:


           rcp path `hostname`:path


 Hewlett-Packard Company            - 5 -   HP-UX 11i Version 2: August 2003


 rcp(1)                                                               rcp(1)


      may produce inconsistent results.  The current HP-UX version of rcp

      simply copies the file over itself.  However, some implementations of

      rcp, including some earlier HP-UX implementations, corrupt the file.

      In addition, the same file may be referred to in multiple ways, for

      example, via hard links, symbolic links, or NFS.  It is not guaranteed

      that rcp will correctly copy a file over itself in all cases.


      Implementations of rcp based on the 4.2BSD version (including the

      implementations of rcp prior to HP-UX 7.0) require that remote users

      be specified as rhost.ruser.  If the first remote host specified in a

      third party transfer (rhost1 in the example below) uses this older

      syntax, the command must have the form:


           rcp ruser1@rhost1:path1 rhost2.ruser2:path2


      since the target is interpreted by rhost1.  A common problem is

      encountered when two remote files are to be copied to a remote target

      that specifies a remote user.  If the two remote source systems,

      rhost1 and rhost2, each expect a different form for the remote target,

      the command:


           rcp rhost1:path1 rhost2:path2 rhost3.ruser3:path3


      will certainly fail on one of the source systems.  Perform such a

      transfer using two separate commands.


      With the existing implementation of rcp, the remote copy may result in

      a system overwrite as described in the following example.


           rcp -r path root@hostname: /


      In this example, if you run rcp as root, and unintentionally type a

      space between the colon (:) and the slash (/), then rcp assumes both

      path and root@hostname: (the remote machine's root directory) as

      source.  rcp always interprets the last argument as the destination.

      Therefore, the destination directory is the local machine's root

      directory (/).  rcp copies the content of path to the root directory

      (/) first.  It then does another copy with root@hostname as source to

      the root directory (/) again.  This second copy overwrites the local

      system's root directory (/) with the remote system's root directory

      (/).


 DIAGNOSTICS

      Diagnostics can occur from both the local and remote hosts.  Those

      diagnostics that occur on the local host before the connection is

      completely established are written to standard error.  Once the

      connection is established, any error messages from the remote host are

      written to standard output, like any other data.


      Error! could not retrieve authentication type.


 Hewlett-Packard Company            - 6 -   HP-UX 11i Version 2: August 2003


 rcp(1)                                                               rcp(1)


      Please notify sys admin.

           There are two authentication mechanisms used by rcp.  One

           authentication mechanism is based on Kerberos and the other is

           not.  The type of authentication mechanism is obtained from a

           system file which is updated by inetsvcs_sec(1M).  If the system

           file does not contain known authentication types, the above error

           is displayed.


 AUTHOR

      rcp was developed by the University of California, Berkeley.


 SEE ALSO

      cp(1), ftp(1), remsh(1), remshd(1M), inetsvcs_sec(1M), rcmd(3N),

      rcmd_af(3N), hosts(4), hosts.equiv(4), krb5.conf(4), sis(5).


 Hewlett-Packard Company            - 7 -   HP-UX 11i Version 2: August 2003

반응형

'ETC' 카테고리의 다른 글

Internet Explorer9에서 "text/plain" Content Type 변경  (0) 2012.12.14
find와 sed 그리고 xargs  (0) 2012.11.20
OPTIMIZER  (0) 2012.10.15
TortoiseSVN Command  (1) 2012.10.09
[ClearCase] Type manager "_xml2" failed create_version operation.  (0) 2012.08.03