Deleted Added
sdiff udiff text old ( 40101 ) new ( 50471 )
full compact
1.\" Copyright (c) 1983, 1990, 1993
2.\" The Regents of the University of California. All rights reserved.
3.\"
4.\" Redistribution and use in source and binary forms, with or without
5.\" modification, are permitted provided that the following conditions
6.\" are met:
7.\" 1. Redistributions of source code must retain the above copyright
8.\" notice, this list of conditions and the following disclaimer.
9.\" 2. Redistributions in binary form must reproduce the above copyright
10.\" notice, this list of conditions and the following disclaimer in the
11.\" documentation and/or other materials provided with the distribution.
12.\" 3. All advertising materials mentioning features or use of this software
13.\" must display the following acknowledgement:
14.\" This product includes software developed by the University of
15.\" California, Berkeley and its contributors.
16.\" 4. Neither the name of the University nor the names of its contributors
17.\" may be used to endorse or promote products derived from this software
18.\" without specific prior written permission.
19.\"
20.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
21.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
24.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30.\" SUCH DAMAGE.
31.\"
32.\" @(#)rcp.1 8.1 (Berkeley) 5/31/93
33.\" $FreeBSD: head/bin/rcp/rcp.1 50471 1999-08-27 23:15:48Z peter $
34.\"
35.Dd May 31, 1993
36.Dt RCP 1
37.Os BSD 4.3r
38.Sh NAME
39.Nm rcp
40.Nd remote file copy
41.Sh SYNOPSIS
42.Nm rcp
43.Op Fl Kpx
44.Op Fl k Ar realm
45.Ar file1 file2
46.Nm rcp
47.Op Fl Kprx
48.Op Fl k Ar realm
49.Ar file ...
50.Ar directory
51.Sh DESCRIPTION
52.Nm Rcp
53copies files between machines. Each
54.Ar file
55or
56.Ar directory
57argument is either a remote file name of the
58form ``rname@rhost:path'', or a local file name (containing no `:' characters,
59or a `/' before any `:'s).
60.Pp
61The following options are available:
62.Bl -tag -width indent
63.It Fl K
64Turn off all Kerberos authentication.
65.It Fl k
66Request
67.Nm
68to obtain tickets
69for the remote host in realm
70.Ar realm
71instead of the remote host's realm as determined by
72.Xr krb_realmofhost 3 .
73.It Fl p
74Cause
75.Nm
76to attempt to preserve (duplicate) in its copies the modification
77times and modes of the source files, ignoring the
78.Ar umask .
79By default, the mode and owner of
80.Ar file2
81are preserved if it already existed; otherwise the mode of the source file
82modified by the
83.Xr umask 2
84on the destination host is used.
85.It Fl r
86If any of the source files are directories,
87.Nm
88copies each subtree rooted at that name; in this case
89the destination must be a directory.
90.It Fl x
91Turn on
92.Tn DES
93encryption for all data passed by
94.Nm Ns .
95This may impact response time and
96.Tn CPU
97utilization, but provides
98increased security.
99.El
100.Pp
101If
102.Ar path
103is not a full path name, it is interpreted relative to
104the login directory of the specified user
105.Ar ruser
106on
107.Ar rhost ,
108or your current user name if no other remote user name is specified.
109A
110.Ar path
111on a remote host may be quoted (using \e, ", or \(aa)
112so that the metacharacters are interpreted remotely.
113.Pp
114.Nm Rcp
115does not prompt for passwords; it performs remote execution
116via
117.Xr rsh 1 ,
118and requires the same authorization.
119.Pp
120.Nm Rcp
121handles third party copies, where neither source nor target files
122are on the current machine.
123.Sh FILES
124.Bl -tag -width /etc/auth.conf -compact
125.It Pa /etc/auth.conf
126configure authentication services
127.El
128.Sh SEE ALSO
129.Xr cp 1 ,
130.Xr ftp 1 ,
131.Xr rlogin 1 ,
132.Xr rsh 1
133.Sh HISTORY
134The
135.Nm
136command appeared in
137.Bx 4.2 .
138The version of
139.Nm
140described here
141has been reimplemented with Kerberos in
142.Bx 4.3 Reno .
143.Sh BUGS
144Doesn't detect all cases where the target of a copy might
145be a file in cases where only a directory should be legal.
146.Pp
147Is confused by any output generated by commands in a
148.Pa \&.login ,
149.Pa \&.profile ,
150or
151.Pa \&.cshrc
152file on the remote host.
153.Pp
154The destination user and hostname may have to be specified as
155``rhost.rname'' when the destination machine is running the
156.Bx 4.2
157version of
158.Nm Ns .