Sponsored Content
Full Discussion: RCP users log?
Operating Systems Solaris RCP users log? Post 302471217 by nefeli on Friday 12th of November 2010 09:04:26 AM
Old 11-12-2010
RCP users log?

Hello,

I'm scurying a server and I'm trying to control what users are using rcp to copy files right now. I've tried to find in last, but it doesn't log there, searched in Sun documentation, so I cannot anywhere telling were rcp stores a log with the users logins. Do you know if is there one and where?

Thank you very much in advance Smilie
 

10 More Discussions You Might Find Interesting

1. AIX

Log off idle users

How to set a timer for log out users that have been idle for a long time? It is a AIX 5L (0 Replies)
Discussion started by: wtofu
0 Replies

2. UNIX for Dummies Questions & Answers

log users real time

hi.... how i can configurator a log file on real time....on unix solaris.... thanks a lot.... Best Regards... (3 Replies)
Discussion started by: chanfle
3 Replies

3. UNIX for Dummies Questions & Answers

??? Log file users login and logout..???

hi all... only one question.... what is the file...where show me records login and logout of the unix user's..?? thank you.... I waiting for response... (1 Reply)
Discussion started by: chanfle
1 Replies

4. UNIX for Dummies Questions & Answers

Log all connecting users

How can I log all connecting users an log it to a file? For example: The user 'megan' login to the machine 'client1' with rlogin. How and where can I see that she used the rlogin protocol and that her username is megan? Help..! /Tonlu (5 Replies)
Discussion started by: tonlu
5 Replies

5. Solaris

Log Information about login/logout of any users

Hi to all, i want configure my solaris 10 machine to log all login,logout and "su" in a particularly file. How can i do it? Now i enable auth.* in syslog.conf but the informations are written in a confused mode... Thanks (4 Replies)
Discussion started by: suuuper
4 Replies

6. UNIX for Dummies Questions & Answers

How to log what users are doing??

Guys i am new in forum and come to ask some help in this. What i want is to log what users are doing. Someone told me to make a script and get the history commands of all users and storage this in a DB. but the problem in this is, i want to log all things. Why this? why my 2 machines is only a... (4 Replies)
Discussion started by: Amgrim
4 Replies

7. Shell Programming and Scripting

Monitoring a users log in time?

how do i start with this guys? Sample run: $ LOGTIME it2015678 <enter> User it2015678 is CRUZ Tommy H And has logged on to the system for: 8 hours 12 minutes from the time this script was run. (1 Reply)
Discussion started by: skypigeon
1 Replies

8. Shell Programming and Scripting

Log to find users who accessed server before

Hi, please provide the steps/commands to find out the user id list who accessed server before i logon same server. Thank you very much ffor all your support. (2 Replies)
Discussion started by: sridhardwh
2 Replies

9. Shell Programming and Scripting

Specified log in time for users

I have this task : Check the logintime.txt every minute to only allow user to log in at the specified time. logintime.txt has the following content: USER TIME_START TIME_STOP Example: john 17:00 18:00 My idea is locking the user at the TIME_STOP and unlocking at the TIME_START while... (4 Replies)
Discussion started by: muffle
4 Replies

10. Ubuntu

Users Access - AD Authentication - User can't log in?

I have a user who's having troubles logging into one of my servers, that is authenticating with AD. After glancing over /etc/passwd, I found the users account is different than mine and others who aren't having any issues. What's the difference between these two accounts? What's the "1 60 14 60" ?... (1 Reply)
Discussion started by: Nvizn
1 Replies
RCP(1)							      General Commands Manual							    RCP(1)

NAME
rcp - remote file copy SYNOPSIS
rcp [-p] [-x] [-k realm ] [-D port] [-N] [-PN | -PO] file1 file2 rcp [-p] [-x] [-k realm] [-r] [-D port] [-N] [-PN | -PO] file ... directory DESCRIPTION
Rcp copies files between machines. Each file or directory argument is either a remote file name of the form ``rhost:path'', or a local file name (containing no `:' characters, or a `/' before any `:'s). By default, the mode and owner of file2 are preserved if it already existed; otherwise the mode of the source file modified by the umask(2) on the destination host is used. If path is not a full path name, it is interpreted relative to your login directory on rhost. A path on a remote host may be quoted (using , ", or ') so that the metacharacters are interpreted remotely. Rcp does not prompt for passwords; it uses Kerberos authentication when connecting to rhost. Each user may have a private authorization list in a file .k5login in his login directory. Each line in this file should contain a Kerberos principal name of the form princi- pal/instance@realm. If there is a ~/.k5login file, then access is granted to the account if and only if the originater user is authenti- cated to one of the principals named in the ~/.k5login file. Otherwise, the originating user will be granted access to the account if and only if the authenticated principal name of the user can be mapped to the local account name using the aname -> lname mapping rules (see krb5_anadd(8) for more details). OPTIONS
-p attempt to preserve (duplicate) the modification times and modes of the source files in the copies, ignoring the umask. -x encrypt all information transferring between hosts. -k realm obtain tickets for the remote host in realm instead of the remote host's realm as determined by krb_realmofhost(3). -r if any of the source files are directories, copy each subtree rooted at that name; in this case the destination must be a directory. -PN -PO Explicitly request new or old version of the Kerberos ``rcmd'' protocol. The new protocol avoids many security problems found in the old one, but is not interoperable with older servers. (An "input/output error" and a closed connection is the most likely result of attempting this combination.) If neither option is specified, some simple heuristics are used to guess which to try. -D port connect to port port on the remote machine. -N use a network connection, even when copying files on the local machine (used for testing purposes). Rcp handles third party copies, where neither source nor target files are on the current machine. Hostnames may also take the form ``rname@rhost'' to use rname rather than the current user name on the remote host. FILES
~/.k5login (on remote host) - file containing Kerberos principals that are allowed access. SEE ALSO
cp(1), ftp(1), rsh(1), rlogin(1), kerberos(3), krb_getrealm(3), rcp(1) [UCB version] BUGS
Rcp doesn't detect all cases where the target of a copy might be a file in cases where only a directory should be legal. Rcp is confused by any output generated by commands in a .login, .profile, or .cshrc file on the remote host. Kerberos is only used for the first connection of a third-party copy; the second connection uses the standard Berkeley rcp protocol. RCP(1)
All times are GMT -4. The time now is 12:54 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy