12-10-2010
Still no dice. I am getting very close to going at this server with a sledge hammer at this point. I burnt the files to a DVD and vold isn't recognizing them. So damn annoying not having ssh/scp.
10 More Discussions You Might Find Interesting
1. Solaris
When I ssh to my box, an Ultra 5. I get prompted for password immediately. I enter it and have to wait sometimes a full minute for it to prompt for a password.
The same thing happens when i try to ftp to the box, it will say connected, but it takes forever to prompt for password, and... (2 Replies)
Discussion started by: BG_JrAdmin
2 Replies
2. Red Hat
I have rebooted my box (Redhat Linux) and the system is back online now, but Iam unable to login via ssh for all the users including root, it says "Login Incorrect". I am pretty sure the username/password is correct.May be the password or the shadow file is corrupted ???
How do i login to the... (6 Replies)
Discussion started by: sydney2008
6 Replies
3. UNIX for Dummies Questions & Answers
Hi to all,
I get a problem when i tried to modifie the password of the root,but thi s the message i have on root password,even i put the old password i have the same message "password has expired, you are allowed to entry by daemon"Could any one give me any suggestion to solve the problem?... (2 Replies)
Discussion started by: espace1000
2 Replies
4. UNIX for Dummies Questions & Answers
Hi,
We have an application which runs on telnet port, application structure is file based, we have to give write permissions to all the users to all files so that they can work on the system.
Recently we have noticed that all ordinary users can login through ftp and delete any file (... (7 Replies)
Discussion started by: nervous
7 Replies
5. Solaris
Hello,
I have an issue with a NIS client station on my network. I can't log onto with any NIS login and it prompt "Login incorrectl please try again". My others stations work correctly and log on without problem.
This station worked correctly before yesterday, but yesterday we've got a power... (5 Replies)
Discussion started by: Juterassee
5 Replies
6. UNIX for Dummies Questions & Answers
I want to change login failure message, "login incorrect"
deny user login for user id tom
sudo passwd -l tom
type username and type password on login prompt
and then it will display login failure message "login incorrect"
console
############
login: tom
password:
login incorrect... (2 Replies)
Discussion started by: lifegeek
2 Replies
7. Solaris
Well I use OpenSolaris about 6 months until all traquilo ai ...
OpenSolaris is a partitioned HD but only have OpenSolaris. the other partition is empty.
Oh for some reason the personal I would WINDOWS installing xp then did the normal installation of windows and made a NTFS partition on that HD... (2 Replies)
Discussion started by: Hyagosallet
2 Replies
8. UNIX for Dummies Questions & Answers
Hi,
i am trying to do a RCP from a reality environment machine to a unix directory and coming up with the error
remshd: Login incorrect.
Any ideas?
Thanks (2 Replies)
Discussion started by: Jtyreman
2 Replies
9. UNIX for Dummies Questions & Answers
I am creating (or trying to) an awk script to retrieve various data from an input file and output the data in a different format. I think it is self explanatory what I am attempting but I getting the error Field $() isincorrect when I reun it using
awk -f file.awk inputfile
#!/bin/awk -f... (3 Replies)
Discussion started by: Bruble
3 Replies
10. SuSE
Hi
I upgraded my Suse linux server and installed a complete new server with suse ver 11. I copied the passwd and shadow files from the old Suse 10 to the new Suse 11 server (/etc)
Now I get "530 Login incorrect" error when I try to FTP into an account with correct username and password.
Can... (1 Reply)
Discussion started by: Tony.Marshall
1 Replies
SCP(1) BSD General Commands Manual SCP(1)
NAME
scp -- secure copy (remote file copy program)
SYNOPSIS
scp [-1246BCpqrv] [-c cipher] [-F ssh_config] [-i identity_file] [-l limit] [-o ssh_option] [-P port] [-S program] [[user@]host1:]file1 ...
[[user@]host2:]file2
DESCRIPTION
scp copies files between hosts on a network. It uses ssh(1) for data transfer, and uses the same authentication and provides the same secu-
rity as ssh(1). Unlike rcp(1), scp will ask for passwords or passphrases if they are needed for authentication.
File names may contain a user and host specification to indicate that the file is to be copied to/from that host. Local file names can be
made explicit using absolute or relative pathnames to avoid scp treating file names containing ':' as host specifiers. Copies between two
remote hosts are also permitted.
The options are as follows:
-1 Forces scp to use protocol 1.
-2 Forces scp to use protocol 2.
-4 Forces scp to use IPv4 addresses only.
-6 Forces scp to use IPv6 addresses only.
-B Selects batch mode (prevents asking for passwords or passphrases).
-C Compression enable. Passes the -C flag to ssh(1) to enable compression.
-c cipher
Selects the cipher to use for encrypting the data transfer. This option is directly passed to ssh(1).
-F ssh_config
Specifies an alternative per-user configuration file for ssh. This option is directly passed to ssh(1).
-i identity_file
Selects the file from which the identity (private key) for public key authentication is read. This option is directly passed to
ssh(1).
-l limit
Limits the used bandwidth, specified in Kbit/s.
-o ssh_option
Can be used to pass options to ssh in the format used in ssh_config(5). This is useful for specifying options for which there is no
separate scp command-line flag. For full details of the options listed below, and their possible values, see ssh_config(5).
AddressFamily
BatchMode
BindAddress
ChallengeResponseAuthentication
CheckHostIP
Cipher
Ciphers
Compression
CompressionLevel
ConnectionAttempts
ConnectTimeout
ControlMaster
ControlPath
GlobalKnownHostsFile
GSSAPIAuthentication
GSSAPIDelegateCredentials
HashKnownHosts
Host
HostbasedAuthentication
HostKeyAlgorithms
HostKeyAlias
HostName
IdentityFile
IdentitiesOnly
KbdInteractiveDevices
LogLevel
MACs
NoHostAuthenticationForLocalhost
NumberOfPasswordPrompts
PasswordAuthentication
PKCS11Provider
Port
PreferredAuthentications
Protocol
ProxyCommand
PubkeyAuthentication
RekeyLimit
RhostsRSAAuthentication
RSAAuthentication
SendEnv
ServerAliveInterval
ServerAliveCountMax
StrictHostKeyChecking
TCPKeepAlive
UsePrivilegedPort
User
UserKnownHostsFile
VerifyHostKeyDNS
-P port
Specifies the port to connect to on the remote host. Note that this option is written with a capital 'P', because -p is already
reserved for preserving the times and modes of the file in rcp(1).
-p Preserves modification times, access times, and modes from the original file.
-q Quiet mode: disables the progress meter as well as warning and diagnostic messages from ssh(1).
-r Recursively copy entire directories. Note that scp follows symbolic links encountered in the tree traversal.
-S program
Name of program to use for the encrypted connection. The program must understand ssh(1) options.
-v Verbose mode. Causes scp and ssh(1) to print debugging messages about their progress. This is helpful in debugging connection,
authentication, and configuration problems.
The scp utility exits 0 on success, and >0 if an error occurs.
SEE ALSO
rcp(1), sftp(1), ssh(1), ssh-add(1), ssh-agent(1), ssh-keygen(1), ssh_config(5), sshd(8)
HISTORY
scp is based on the rcp(1) program in BSD source code from the Regents of the University of California.
AUTHORS
Timo Rinne <tri@iki.fi>
Tatu Ylonen <ylo@cs.hut.fi>
BSD
February 8, 2010 BSD