aboutsummaryrefslogtreecommitdiff
path: root/src/appl/bsd/rcp.M
blob: e047db5d653add11e4b17ecfce091998208f7780 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
.\" appl/bsd/rcp.M
.\"
.\" Copyright (c) 1983 The Regents of the University of California.
.\" All rights reserved.
.\"
.\" Redistribution and use in source and binary forms are permitted
.\" provided that the above copyright notice and this paragraph are
.\" duplicated in all such forms and that any documentation,
.\" advertising materials, and other materials related to such
.\" distribution and use acknowledge that the software was developed
.\" by the University of California, Berkeley.  The name of the
.\" University may not be used to endorse or promote products derived
.\" from this software without specific prior written permission.
.\" THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR
.\" IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
.\" WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
.\"
.\"	@(#)rcp.1	6.6 (Berkeley) 9/20/88
.\"
.TH RCP 1
.SH NAME
rcp \- remote file copy
.SH SYNOPSIS
.B rcp
[\fB\-p\fP] [\fB\-x\fP] [\fB\-k\fP \fIrealm\fP ] [\fB\-D\fP \fIport\fP]
[\fB\-N\fP]
[\fB\-PN | \-PO\fP]
.I file1 file2
.sp
.B rcp
[\fB\-p\fB] [\fB\-x\fP] [\fP\-k\fP \fIrealm\fP] [\fB\-r\fP] [\fB\-D\fP
\fIport\fP] [\fB\-N\fP]
[\fB\-PN | \-PO\fP]
.I file ... directory
.SH DESCRIPTION
.B Rcp
copies files between machines.  Each
.I file
or
.I directory
argument is either a remote file name of the form ``rhost:path'', or a
local file name (containing no `:' characters, or a `/' before any
`:'s).
.PP
By default, the mode and owner of
.I file2
are preserved if it already existed; otherwise the mode of the source
file modified by the
.IR umask (2)
on the destination host is used.
.PP
If
.I path
is not a full path name, it is interpreted relative to your login
directory on
.IR rhost .
A 
.I path
on a remote host may be quoted (using \e, ", or \(aa) so that the
metacharacters are interpreted remotely.
.PP
.B Rcp
does not prompt for passwords; it uses Kerberos authentication when
connecting to
.IR rhost .
Each user may have a private authorization list in a file \&.k5login in
his login directory.  Each line in this file should contain a Kerberos
principal name of the form
.IR principal/instance@realm .
If there is a ~/.k5login file, then access is granted to the account if
and only if the originater user is authenticated to one of the
principals named in the ~/.k5login file.  Otherwise, the originating
user will be granted access to the account if and only if the
authenticated principal name of the user can be mapped to the local
account name using the aname -> lname mapping rules (see
.IR krb5_anadd (8)
for more details).
.SH OPTIONS
.TP
.B \-p
attempt to preserve (duplicate) the modification times and modes of the
source files in the copies, ignoring the
.IR umask .
.TP
\fB\-x\fP
encrypt all information transferring between hosts.
.TP
\fB\-k\fP \fIrealm\fP
obtain tickets for the remote host in
.I realm
instead of the remote host's realm as determined by
.IR krb_realmofhost (3).
.TP
.B \-r
if any of the source files are directories, copy each subtree rooted at
that name; in this case the destination must be a directory.
.TP
\fB-PN\fP
.TP
\fB-PO\fP
Explicitly request new or old version of the Kerberos ``rcmd''
protocol.  The new protocol avoids many security problems found in the
old one, but is not interoperable with older servers.  (An
"input/output error" and a closed connection is the most likely result
of attempting this combination.)  If neither option is specified, some
simple heuristics are used to guess which to try.
.TP
\fB\-D\fP \fIport\fP
connect to port
.I port
on the remote machine.  
.TP
.B \-N
use a network connection, even when copying files on the local machine
(used for testing purposes).
.PP
.B Rcp
handles third party copies, where neither source nor target files are on
the current machine.  Hostnames may also take the form ``rname@rhost''
to use
.I rname
rather than the current user name on the remote host.
.SH FILES
.TP "\w'~/.k5login\ \ 'u"
~/.k5login
(on remote host) - file containing Kerberos principals that are allowed
access.
.SH SEE ALSO
cp(1), ftp(1), rsh(1), rlogin(1), kerberos(3), krb_getrealm(3), rcp(1)
[UCB version]
.SH BUGS
.B Rcp
doesn't detect all cases where the target of a copy might be a file in
cases where only a directory should be legal.
.PP
.B Rcp
is confused by any output generated by commands in a \&.login,
\&.profile, or \&.cshrc file on the remote host.
.PP
Kerberos is only used for the first connection of a third-party copy;
the second connection uses the standard Berkeley rcp protocol.