1.\" Copyright (c) 1983, 1990, 1993 2.\" The Regents of the University of California. All rights reserved. 3.\" 4.\" Redistribution and use in source and binary forms, with or without 5.\" modification, are permitted provided that the following conditions 6.\" are met: 7.\" 1. Redistributions of source code must retain the above copyright 8.\" notice, this list of conditions and the following disclaimer. 9.\" 2. Redistributions in binary form must reproduce the above copyright 10.\" notice, this list of conditions and the following disclaimer in the 11.\" documentation and/or other materials provided with the distribution. 12.\" 3. All advertising materials mentioning features or use of this software 13.\" must display the following acknowledgement: 14.\" This product includes software developed by the University of 15.\" California, Berkeley and its contributors. 16.\" 4. Neither the name of the University nor the names of its contributors 17.\" may be used to endorse or promote products derived from this software 18.\" without specific prior written permission. 19.\" 20.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 21.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 22.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 23.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 24.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 30.\" SUCH DAMAGE. 31.\" 32.\" @(#)rcp.1 8.1 (Berkeley) 5/31/93
|
33.\" $Id: rcp.1,v 1.6 1998/05/18 06:36:02 charnier Exp $
|
33.\" $FreeBSD: head/bin/rcp/rcp.1 50471 1999-08-27 23:15:48Z peter $ |
34.\" 35.Dd May 31, 1993 36.Dt RCP 1 37.Os BSD 4.3r 38.Sh NAME 39.Nm rcp 40.Nd remote file copy 41.Sh SYNOPSIS 42.Nm rcp 43.Op Fl Kpx 44.Op Fl k Ar realm 45.Ar file1 file2 46.Nm rcp 47.Op Fl Kprx 48.Op Fl k Ar realm 49.Ar file ... 50.Ar directory 51.Sh DESCRIPTION 52.Nm Rcp 53copies files between machines. Each 54.Ar file 55or 56.Ar directory 57argument is either a remote file name of the 58form ``rname@rhost:path'', or a local file name (containing no `:' characters, 59or a `/' before any `:'s). 60.Pp 61The following options are available: 62.Bl -tag -width indent 63.It Fl K 64Turn off all Kerberos authentication. 65.It Fl k 66Request 67.Nm 68to obtain tickets 69for the remote host in realm 70.Ar realm 71instead of the remote host's realm as determined by 72.Xr krb_realmofhost 3 . 73.It Fl p 74Cause 75.Nm 76to attempt to preserve (duplicate) in its copies the modification 77times and modes of the source files, ignoring the 78.Ar umask . 79By default, the mode and owner of 80.Ar file2 81are preserved if it already existed; otherwise the mode of the source file 82modified by the 83.Xr umask 2 84on the destination host is used. 85.It Fl r 86If any of the source files are directories, 87.Nm 88copies each subtree rooted at that name; in this case 89the destination must be a directory. 90.It Fl x 91Turn on 92.Tn DES 93encryption for all data passed by 94.Nm Ns . 95This may impact response time and 96.Tn CPU 97utilization, but provides 98increased security. 99.El 100.Pp 101If 102.Ar path 103is not a full path name, it is interpreted relative to 104the login directory of the specified user 105.Ar ruser 106on 107.Ar rhost , 108or your current user name if no other remote user name is specified. 109A 110.Ar path 111on a remote host may be quoted (using \e, ", or \(aa) 112so that the metacharacters are interpreted remotely. 113.Pp 114.Nm Rcp 115does not prompt for passwords; it performs remote execution 116via 117.Xr rsh 1 , 118and requires the same authorization. 119.Pp 120.Nm Rcp 121handles third party copies, where neither source nor target files 122are on the current machine. 123.Sh FILES 124.Bl -tag -width /etc/auth.conf -compact 125.It Pa /etc/auth.conf 126configure authentication services 127.El 128.Sh SEE ALSO 129.Xr cp 1 , 130.Xr ftp 1 , 131.Xr rlogin 1 , 132.Xr rsh 1 133.Sh HISTORY 134The 135.Nm 136command appeared in 137.Bx 4.2 . 138The version of 139.Nm 140described here 141has been reimplemented with Kerberos in 142.Bx 4.3 Reno . 143.Sh BUGS 144Doesn't detect all cases where the target of a copy might 145be a file in cases where only a directory should be legal. 146.Pp 147Is confused by any output generated by commands in a 148.Pa \&.login , 149.Pa \&.profile , 150or 151.Pa \&.cshrc 152file on the remote host. 153.Pp 154The destination user and hostname may have to be specified as 155``rhost.rname'' when the destination machine is running the 156.Bx 4.2 157version of 158.Nm Ns .
|