Sponsored Content
Full Discussion: SSH/RCP connectivity error
Top Forums UNIX for Advanced & Expert Users SSH/RCP connectivity error Post 302368746 by anitha111 on Thursday 5th of November 2009 01:15:27 PM
Old 11-05-2009
SSH/RCP connectivity error

Hi Team,
Hope you will be able to help me out with this problem.
Our sun solaris 9 system receives Idoc files from another xxx system through RCP. But before RCP they establish an SSH connection. Since today morning they are not able to establish connection and is getting an error as pasted below when trying to connect us:
HOST =xx.xx.xx.xxx
PROG =<path>/bin/rcprfcexec.sh
**** Trace file opened at 20091105 124559 GMT, REL 46D,0,2415, VER 3
======> CPIC-CALL: 'ThSAPECMINIT' : cmRc=27 thRc=456
Timeout during connection setup (check that partner exists)
Error RFCIO_ERROR_SYSERROR in abrfcpic.c : 1356
CPIC-CALL: 'ThSAPECMINIT' : cmRc=27 thRc=456
------------------------------------------------------------------------
I am sure there were no changes like patching done to our unix box and no other apparent chages are done by us also. I am unable to figure out the problem for this.

Hopefully you may be able to help me.
Thank you.
 

9 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

rcp error

I'm trying to perform a rcp to a remote machine, but it keeps throwing up "LOGNAME: undefined variable" error. When I echo $LOGNAME, it comes up with my username. I have tried setting both the .rhosts and the .hosts.equiv file but to no avail (on both machines as well out of desperation!). Anyone... (8 Replies)
Discussion started by: divid_gil
8 Replies

2. UNIX for Advanced & Expert Users

SSH Connectivity script

Hi all, I have developed a script to list out the servers that is not able to connect to the remote host. The problem with this script is it, if the remote server ask for a password it gets struck there. It works only if the server name is invalid Ex: Lets say ssh -q test@test "exit" <... (5 Replies)
Discussion started by: lorcan
5 Replies

3. Shell Programming and Scripting

ssh connectivity problem

Hi All, i have problem with ssh i have three server(linux box) like below server A server B server C i did ssh(Private key & Public key) for passwordls .. i did for server A to Server B connection without any issue now i am able to connect server A to server B without... (6 Replies)
Discussion started by: Shahul
6 Replies

4. Shell Programming and Scripting

Verifying SSH connectivity in a script

Hi everyone, I'm trying to write a korne shell script that takes the IP address of a remote server as an argument and logs into that server if RSA key has been setup properly, otherwise exits if RSA key is not set for that server. I don't want the script to get stuck with Password prompt... (1 Reply)
Discussion started by: omd
1 Replies

5. UNIX for Advanced & Expert Users

SSH connectivity between two machines with private key

Hi I have two machines Mac1 and Mac2 logging in with same user id and same private key. can anyone let me know how to connect these two machine using ssh . or SCP files to other machine :wall: (1 Reply)
Discussion started by: madankumar
1 Replies

6. Shell Programming and Scripting

ssh connectivity

Hi, I have two unix servers named as uni115.net uni116.net In both the boxes, I have sudo access to access some file. From uni115.net , I need to login to uni116.net through script And while running my main script , it wont ask the password for login to another machine. How can we do... (1 Reply)
Discussion started by: ckchelladurai
1 Replies

7. Shell Programming and Scripting

ssh connectivity

Hi i have two servers name as ser1 ser2 with sudo user name "test" I want to ssh to the ser2 without using apassword am login with normal ssh method likes ssh test@ser2 i got the id_rsa.pub from ser1 and pasted int authorized_keys in ser2. and while connecting got one RSA key fingerprint .... (3 Replies)
Discussion started by: ckchelladurai
3 Replies

8. Shell Programming and Scripting

SSH Connectivity

I am trying to setup a password less connection from a Linux server to Window server and will be using a script to scp a file without using password. Linux Server (source) servername : testlinux id : testbatch Windows Server (Target) servername : testwin id : testwinlogin I copied... (5 Replies)
Discussion started by: dr46014
5 Replies

9. HP-UX

Rsync an rcp error

Hi, I have installed rsync (together with its dependencies) in both source and destination HPUX servers (V 11.31). However when I attempt to copy files over (as user root) I get this error : # rsync -avz ./* root@10.97.131.4:/tmp/copy Password: sh: rsync: not found. rsync: connection... (5 Replies)
Discussion started by: anaigini45
5 Replies
RCP(1)							      General Commands Manual							    RCP(1)

NAME
rcp - remote file copy SYNOPSIS
rcp [-p] [-x] [-k realm ] [-c ccachefile] [-C configfile] [-D port] [-N] [-PN | -PO] file1 file2 rcp [-p] [-x] [-k realm] [-r] [-D port] [-N] [-PN | -PO] file ... directory rcp [-f | -t] ... DESCRIPTION
Rcp copies files between machines. Each file or directory argument is either a remote file name of the form ``rhost:path'', or a local file name (containing no `:' characters, or a `/' before any `:'s). By default, the mode and owner of file2 are preserved if it already existed; otherwise the mode of the source file modified by the umask(2) on the destination host is used. If path is not a full path name, it is interpreted relative to your login directory on rhost. A path on a remote host may be quoted (using , ", or ') so that the metacharacters are interpreted remotely. Rcp does not prompt for passwords; it uses Kerberos authentication when connecting to rhost. Each user may have a private authorization list in a file .k5login in his login directory. Each line in this file should contain a Kerberos principal name of the form princi- pal/instance@realm. If there is a ~/.k5login file, then access is granted to the account if and only if the originater user is authenti- cated to one of the principals named in the ~/.k5login file. Otherwise, the originating user will be granted access to the account if and only if the authenticated principal name of the user can be mapped to the local account name using the aname -> lname mapping rules (see krb5_anadd(8) for more details). OPTIONS
-p attempt to preserve (duplicate) the modification times and modes of the source files in the copies, ignoring the umask. -x encrypt all information transferring between hosts. -k realm obtain tickets for the remote host in realm instead of the remote host's realm as determined by krb_realmofhost(3). -c ccachefile change the default credentials cache file to ccachefile -r if any of the source files are directories, copy each subtree rooted at that name; in this case the destination must be a directory. -PN -PO Explicitly request new or old version of the Kerberos ``rcmd'' protocol. The new protocol avoids many security problems found in the old one, but is not interoperable with older servers. (An "input/output error" and a closed connection is the most likely result of attempting this combination.) If neither option is specified, some simple heuristics are used to guess which to try. -D port connect to port port on the remote machine. -N use a network connection, even when copying files on the local machine (used for testing purposes). -f -t These options are for internal use only. They tell the remotely-running rcp process (started via the Kerberos remote shell daemon) which direction files are being sent. These options should not be used by the user. In particular, -f does not mean that the user's Kerberos ticket should be forwarded! Rcp handles third party copies, where neither source nor target files are on the current machine. Hostnames may also take the form ``rname@rhost'' to use rname rather than the current user name on the remote host. FILES
~/.k5login (on remote host) - file containing Kerberos principals that are allowed access. SEE ALSO
cp(1), ftp(1), rsh(1), rlogin(1), kerberos(3), krb_getrealm(3), kshd(8), rcp(1) [UCB version] BUGS
Rcp doesn't detect all cases where the target of a copy might be a file in cases where only a directory should be legal. Rcp is confused by any output generated by commands in a .login, .profile, or .cshrc file on the remote host. Kerberos is only used for the first connection of a third-party copy; the second connection uses the standard Berkeley rcp protocol. RCP(1)
All times are GMT -4. The time now is 09:09 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy