rcp.1 (2010 09)

r
rcp(1) rcp(1)
NAME
rcp - remote file copy
SYNOPSIS
Copy Single File
rcp [-p][-S size ][
-R size ] source_file1 dest_file
Copy Multiple Files
rcp [-p][-S size ][
-R size ] source_file1 [source_file2 ]... dest_dir
Copy One or More Directory Subtrees
rcp [-p][-S size ][
-R size ] -r source_dir1 [source_dir2 ]... dest_dir
Copy Files and Directory Subtrees
rcp [-p][-S size ][
-R size ] -r file_or_dir1 [file_or_dir2 ]... dest_dir
In Kerberos V5 Network Authentication Environments
Copy Single File
rcp [-k realm ][-P][
-p][-S size ][-R size ] source_file1 dest_file
Copy Multiple Files
rcp [-k realm ][-P][-p][-S size ][-R
size ] source_file1 [source_file2]... dest_dir
Copy One or More Directory Subtrees
rcp [-k realm ][-P][-p][-S size ][
-R size ] -r source_dir1 [source_dir2 ]... dest_dir
Copy Files and Directory Subtrees
rcp [-k realm ][-P][-p][-S size ][
-R size ] -r file_or_dir1 [file_or_dir2 ]... dest_dir
DESCRIPTION
The
rcp command copies files, directory subtrees, or a combination of files and directory subtrees from
one or more systems to another. In many respects, it is similar to the cp command (see cp(1)).
To use
rcp, you must have read access to files being copied, and read and search (execute) permission on
all directories in the directory path. Note that there are special requirements for third-party transfers,
which are described in the Third-Party Transfers section below.
In a Kerberos V5 Network Authentication environment,
rcp uses the Kerberos V5 protocol while initiat-
ing the connection to a remote host. The authorization mechanism is dependent on the command line
options used to invoke
remshd on the remote host (i.e., -K, -R, -r,or
-k). Kerberos authentication
and authorization rules are described in the Secure Internet Services man page, sis (5).
Although Kerberos authentication and authorizations may apply, the Kerberos mechanism is not applied
when copying files. The files are still transferred in clear text over the network.
The
fallback option can be set in the krb5.conf file within appdefaults Section . Refer to the
krb5.conf (4) manpage for more information on the appdefaults Section .Iffallback is set to true and
the kerberos authentication fails, rcp will use the non-secure mode of authentication.
Note: Command line options override the configuration file options.
Options and Arguments
rcp recognizes the following options and arguments:
source_file , source_dir
This option specifies the name of an existing file or directory on a local or remote
machine that you want to be copied to a specified destination. The source file and
directory names are constructed as follows:
user_name
@hostname :pathname /filename
or
user_name
@hostname :pathname /dirname
Component parts of file and directory names are described below. If multiple exist-
ing files and/or directory subtrees (source_file1, source_file2, ..., etc.) are specified,
then the destination must be a directory. Shell file name expansion is allowed on
HP-UX 11i Version 3: September 2010 1 Hewlett-Packard Company 1

Summary of content (4 pages)