11-13-2001
Try to use ssh and scp instead of the telnet and ftp.
1.) they are crypt data
2.) you can use authentication via keys [read docs] - that is ideal for off-line script usage
10 More Discussions You Might Find Interesting
1. UNIX for Advanced & Expert Users
Hi,
When we use telnet (from unix workstation or windows) to remotely access the Unix server, the environment variables such as: DISPLAY, TERM, LOGNAME are communicate to the telnet server during the telnet session negotiation. By default these variables are passed to the server.
We can... (1 Reply)
Discussion started by: vtran4270
1 Replies
2. Shell Programming and Scripting
Now my task is
there are two servers A and B.
i only can put unix script in server A and database is on server B.
can I write a script in serer A which could telnet to server B and run the script which include sql script and save the output file in server A.
did I make my problem clear? (2 Replies)
Discussion started by: YoYo
2 Replies
3. Programming
hello sir and all my friends
i have a serious problems in creating a telnet protocol with c-program in unix. if any one have this program then please reply me on this mail address.
email address removed (4 Replies)
Discussion started by: abhijit deka
4 Replies
4. AIX
I have some AIX 4.3 machines which have disabled root telnet access.
When you run su - once logged on the machine requests a password and if one is supplied correctly it asks for another users password.
How do I configure this?
Any help is appreciated.
Thank you (0 Replies)
Discussion started by: uXion
0 Replies
5. SCO
Hello.
How can I limit the number of telnet connections in order that from the same IP address it can support at the maximun two simultaneus meetings on SCO Openserver 5.0.7 ?
Thanks. (2 Replies)
Discussion started by: jag
2 Replies
6. Shell Programming and Scripting
Somewhat long story:
I have a simple Perl CGI script that uses Expect to Telnet to a device and grab some data, and then spits it back to Perl for display on the Webpage.
This works for many devices I've tried, but one device just fails, it keeps rejecting the password on this device, only... (1 Reply)
Discussion started by: jondo
1 Replies
7. UNIX for Dummies Questions & Answers
Hi,
I was writing one script which includes to switch to the another telnet automatically from the present telnet server. I was using rlogin but firstly it takes the same user name of the present telnet and secondly it is prompting for the password.
But i want to switch to the another telnet... (2 Replies)
Discussion started by: Prateek
2 Replies
8. UNIX for Dummies Questions & Answers
Hi,
I want to know the difference between these two services. Both are under xinetd. Both are used for enabling and disabling Telnet service. So, can somebody please explain me the difference between the two ?
Thanks in advance :) (0 Replies)
Discussion started by: kashifsd17
0 Replies
9. Shell Programming and Scripting
Hi,
Need some help on exiting the telnet session from the script.
#!/bin/ksh
telnet <ip>
it would print some text and
it would ask for a username and pwd.
I jus need to capture the text and i need to come out of the telnet session.
is it possible without expect ? (6 Replies)
Discussion started by: giri_luck
6 Replies
10. IP Networking
Hey everyone. Something has been bothering me. The telnet program, while I know is insecure, offers a ton of functionality. I can literally test any port's availability. I can send commands to web servers, and email servers, and it's a great toubleshooting tool. can any of this be done with SSH?... (6 Replies)
Discussion started by: Lost in Cyberia
6 Replies
scp(1) User Commands scp(1)
NAME
scp - secure copy (remote file copy program)
SYNOPSIS
scp [-pqrvBC46] [-F ssh_config] [-S program] [-P port] [-c cipher] [-i identity_file] [-o ssh_option] [ [user@]host1:]file1 [...] [
[user@]host2:]file2
DESCRIPTION
The scp utility copies files between hosts on a network. It uses ssh(1) for data transfer, and uses the same authentication and provides
the same security as ssh(1). Unlike rcp(1), scp will ask for passwords or passphrases if they are needed for authentication.
Any file name may contain a host and user specification to indicate that the file is to be copied to/from that host. Copies between two
remote hosts are permitted.
OPTIONS
The following options are supported:
-4 Forces scp to use IPv4 addresses only.
-6 Forces scp to use IPv6 addresses only.
-B Selects batch mode. (Prevents asking for passwords or passphrases.)
-c cipher Selects the cipher to use for encrypting the data transfer. This option is directly passed to ssh(1).
-C Compression enable. Passes the -C flag to ssh(1) to enable compression.
-F ssh_config Specifies an alternative per-user configuration file for ssh(1.).
-i identity_file Selects the file from which the identity (private key) for RSA authentication is read. This option is directly
passed to ssh(1).
-o ssh_option The given option is directly passed to ssh(1).
-p Preserves modification times, access times, and modes from the original file.
-P port Specifies the port to connect to on the remote host. Notice that this option is written with a capital `P', because
-p is already reserved for preserving the times and modes of the file in rcp(1).
-q Disables the progress meter.
-r Recursively copies entire directories.
-S program Specifies the name of the program to use for the encrypted connection. The program must understand ssh(1) options.
-v Verbose mode. Causes scp and ssh(1) to print debugging messages about their progress. This is helpful in debugging
connection, authentication, and configuration problems.
OPERANDS
The following operands are supported:
host1, host2,...The name(s) of the host from or to which the file is to be copied.
file1, file2,...The file(s) to be copied.
EXIT STATUS
The following exit values are returned:
0 Successful completion.
1 An error occurred.
ATTRIBUTES
See attributes(5) for descriptions of the following attributes:
+-----------------------------+-----------------------------+
| ATTRIBUTE TYPE | ATTRIBUTE VALUE |
+-----------------------------+-----------------------------+
|Availability |SUNWsshu |
+-----------------------------+-----------------------------+
|Interface Stability |Evolving |
+-----------------------------+-----------------------------+
SEE ALSO
rcp(1), ssh(1), ssh-add(1), ssh-agent(1), ssh-keygen(1), sshd(1M), attributes(5)
To view license terms, attribution, and copyright for OpenSSH, the default path is /var/sadm/pkg/SUNWsshdr/install/copyright. If the
Solaris operating environment has been installed anywhere other than the default, modify the given path to access the file at the installed
location.
AUTHORS
scp is based on the rcp(1) program in the BSD source code from the Regents of the University of California. The authors are Timo Rinne and
Tatu Ylonen.
SunOS 5.10 9 Jan 2004 scp(1)