Sponsored Content
Full Discussion: recursive rcp
Top Forums Shell Programming and Scripting recursive rcp Post 42883 by davidg on Thursday 6th of November 2003 08:19:25 AM
Old 11-06-2003
for i in `rsh $server "ls /rep1/"`
do
rcp /rep1/${i} mycomefromserver:/path/to-dir/${server}-${i}
done

Regs David
 

10 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

rcp in SCO 5.0.7

I am installing 5.0.7 on an existing SCO network. The 2 other machines are using 5.0.5 and rcp works daily both ways between the 2 older machines. However I cannot copy from either machine running 5.0.5 to the new 5.0.7 machine - "Permission Denied" /etc/hosts is configured correctly... (4 Replies)
Discussion started by: farmacy
4 Replies

2. UNIX for Advanced & Expert Users

rcp error

I'm trying to perform a rcp to a remote machine, but it keeps throwing up "LOGNAME: undefined variable" error. When I echo $LOGNAME, it comes up with my username. I have tried setting both the .rhosts and the .hosts.equiv file but to no avail (on both machines as well out of desperation!). Anyone... (8 Replies)
Discussion started by: divid_gil
8 Replies

3. HP-UX

rcp logs

Hi, Can anyone help me to trace who has made rcp to a HP-UX machine? Is there a file that keeps such records? I know ftp's are recorded in /var/adm/syslog but i only need rcp.Thanks... (0 Replies)
Discussion started by: ilkergu
0 Replies

4. UNIX for Dummies Questions & Answers

Rcp

I am trying to set up RCP so root can access a few machines for file transfer. On the target machine, I have set up a .RHOSTS file that looks like: 10.33.1.59 root However when I try to use RCP to copy a file to this machine, I get permission denied. Is it possible since another user is... (1 Reply)
Discussion started by: hshapiro
1 Replies

5. UNIX for Dummies Questions & Answers

help on rcp,exportfs

i need some help on remote file copyieng.the queeries are: 1:> m working on a machine say(abc) and i want to copy a directory(yes a directory) from a remote machine. so what would be the command. 2:> do in need to login on the source machine from where i want to copy a directory. 3:> is it... (0 Replies)
Discussion started by: mxms755
0 Replies

6. Shell Programming and Scripting

rcp the file

Hi I am using rcp command to copy the file one linux to other linux machine I need the ouput log for this like 1 file coied size of the file date stamp my copy comman is rcp 10.100.11.2:/u01/pr/uni.txt /u05/ryd/uni.txt once this script run i need to capture the... (3 Replies)
Discussion started by: aboorkuma
3 Replies

7. Shell Programming and Scripting

rcp problem

Hi, When I try to use rcp I donīt recieve the file I try to fetch. I donīt get any error message, it just execute and as far as I can tell doesnīt do anything. I have no problem with using remsh to list the directory. remsh 132.196.133.185 -l root ls xdpyinfo: unable to open display... (7 Replies)
Discussion started by: mr_andrew
7 Replies

8. UNIX for Dummies Questions & Answers

RCP command

hi, When i use RCP command to copy filr from a different servers, it is showing as connection refused??? ca anyone help me out??? thanks, Arun Manas:b: (2 Replies)
Discussion started by: arunmanas
2 Replies

9. Shell Programming and Scripting

rcp -r || cp -r

what different between two instruction cp -r rcp -r (1 Reply)
Discussion started by: tamer11007
1 Replies

10. Solaris

Rcp between 2 computers

Hi, I need to rcp heavy files between 2 solaris 10/sparc M3000 computers. Currently theses 2 computers are linked via a switch/firewall and the rcp commands take a very long time, I have been told that this is because of the firewall (old one). I asked my client to by a cross ethernet cable and... (2 Replies)
Discussion started by: zionassedo
2 Replies
krb5_auth_rules(5)					Standards, Environments, and Macros					krb5_auth_rules(5)

NAME
krb5_auth_rules - Overview of Kerberos V5 authorization DESCRIPTION
When a user uses kerberized versions of the ftp, rdist, rcp, rlogin, rsh, or telnet clients to connect to a server, even if the user's claimed Kerberos V5 identity is authenticated, the user is not necessarily authorized. Authentication merely proves that the user is "who he says he is" to the Kerberos V5 authentication system. Authorization also needs to be done, since it determines if that Kerberos identity is permitted to access the Solaris user account that the client wants to access. Each user may have a private authorization list in a file ~/.k5login in his login directory (on the server). Each line in this file should contain a Kerberos principal name of the form principal/instance@realm. If the server finds a ~/.k5login file, then access is granted to the account if and only if the originating user is authenticated to one of the principals named in the ~/.k5login file. If there is no ~/.k5login file, the originating user will then be checked against the gsscred table (see gsscred(1M)). If the originating user's Kerberos V5 identity is in the gsscred table, and if the UNIX user id in the gsscred table corresponds to the user account the client is trying access, then the originating user is granted access to the account on the server. If the UNIX user id does not match, then the originating user is denied access. For example, suppose the originating user has a principal name of jdb@ENG.ACME.COM and the target account is jdb-user. If jdb@ENG.ACME.COM appears in the gsscred table with uid 23154 and if jdb-user appears in the user account database (see passwd(4)) with uid 23154, then access to account jdb-user is granted. Of course, normally, the target account name in this example would be jdb and not jdb-user. Finally, if there is no ~/.k5login file and if the originating user's Kerberos V5 identity is not in the gsscred table, then the user will be granted access to the account if and only if all of the following are true: o The user part of the authenticated principal name is the same as the target account name specified by the client. o The realm part of the client and server are the same. o The target account name exists on the server. For example, if the originating user has a principal name of jdb@ENG.ACME.COM and if the server is in realm SALES.ACME.COM, then even if jdb is a valid account name on the server, the client would be denied access. This is because the realms SALES.ACME.COM and ENG.ACME.COM differ. FILES
~/.k5login Per user-account authorization file. /etc/passwd System account file. This information may also be in a directory service. See passwd(4). ATTRIBUTES
See attributes(5) for a description of the following attributes: +-----------------------------+-----------------------------+ | ATTRIBUTE TYPE | ATTRIBUTE VALUE | +-----------------------------+-----------------------------+ |Interface Stability |Evolving | +-----------------------------+-----------------------------+ SEE ALSO
ftp(1), rcp(1), rdist(1), rlogin(1), rsh(1), telnet(1), gsscred(1M), passwd(4), attributes(5), gss_auth_rules(5) NOTES
To avoid security problems, the ~/.k5login file must be owned by the remote user. SunOS 5.10 13 Apr 2004 krb5_auth_rules(5)
All times are GMT -4. The time now is 01:14 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy