VMS Help
TCPIP Services, Remote Commands
*Conan The Librarian (sorry for the slow response - running on an old VAX)
|
|
The Remote (R) commands provided by the DIGITAL TCP/IP Services
for OpenVMS software allow you to work in accounts on remote
internet systems also supporting the Remote (R) protocols. You
can also enter commands, shell scripts, and command procedures to
these remote host systems without logging in to the hosts. These
R commands include
o RCP (Remote Copy)
o RLOGIN (Remote Login)
o RSH (Remote Shell)
o REXEC (Remote Execute, invoked by RSH).
You enter these commands at your system command line prompt.
To use the Remote (R) commands, you need access to an account on
the remote host, which is granted by either of the following:
o An entry in the remote host's authentication or proxy files
o Knowledge of a valid remote account and its password
To use a remote command on your OpenVMS system, remote hosts need
to know the user name that you want to use on the host. You can
provide the user name in either of two ways:
o Automatically: You do not need to take any action if your
user name is the same on the remote host as it is on the local
host. The remote commands automatically supply your local user
name as the requested user name on the remote system.
o Using the /USER_NAME qualifier: Specify the user name with the
/USER_NAME qualifier if your user name is:
- Different on the remote host
- In mixed case (only for remote hosts supporting case-
sensitive user names)
- The same on the remote host but you want to access the
remote host using another user name
By default, the R commands send all user names in lowercase
letters. If you access a host that supports case-sensitive
user names, and the user name you specify has uppercase
letters, you may use the /NOLOWERCASE qualifier to maintain
these letters as uppercase, or you can specify the /USER_NAME
qualifier with the user name within quotes.
The remote host must also know your password or know you
as a trusted user on your local system through a proxy or
authentication:
o Accessing remote hosts by providing your password:
- Certain systems have case-sensitive passwords. To send your
lowercase or mixed-case password to these hosts, enclose it
within quotation marks ( " " ).
- On systems that are not case sensitive, you do not need to
enclose your password within quotation marks ( " " ).
- You can specify the password on the command line:
$ RSH WOODS /PASSWORD="Downy" LS
Or, you can specify the password when the remote system
prompts:
$ RSH WOODS /PASSWORD DIR
REXEC password: (password not echoed)
o Accessing remote hosts as a trusted user:
Most systems use certain authentication files or proxy
accounts that allow trusted users on trusted hosts to access
the system by specifying only the user name they want to
use. To access a host without specifying the corresponding
password, your originating host and user name must have an
entry in these authentication files.
The authentication file entries contain your originating user
name. The R commands convert your originating user name to
lowercase unless you use the /NOLOWERCASE qualifier. You may
have to contact the system manager of the remote system to
determine if the system is case-sensitive and, if so, what
case is used in the authentication files.
NOTES
o To use the REXEC feature, you must always use the
/PASSWORD qualifier.
o The RLOGIN command does not recognize the /PASSWORD
qualifier. If you are a trusted user, you are
automatically logged in to the remote system.
o If you are not a trusted user, the remote host (REXEC)
prompts you to enter a user name and password on the
remote system.
o Quotation Marks
Use quotation marks (" ") for UNIX host path names that
include slashes (/), such as user/simms/offers, and for
user/host specifications that include the username@hostname
syntax.
If the remote host uses case-sensitive user names and
passwords, use quotation marks in the following situations:
o User names and passwords are mixed case.
o Passwords are lowercase.
o User names are uppercase, unless you use the /NOLOWERCASE
qualifier.
o Qualifiers
You can specify R command qualifiers in either of two ways:
o Enter the qualifiers on the command line.
$ RCP /LOG TRANQUIL:VULTURES []
$ RSH /EIGHTBIT /ESCAPE_CHAR="+" /TRUNCATE HERON CAT -N STREAMS
o Add the same information to your LOGIN.COM file, for
example:
$ ! To customize my R commands:
$ !
$ RCP :== RCP /LOG
$ RLOGIN :== RLOGIN /EIGHTBIT/ESCAPE_CHAR="+" /TRUNCATE_USER_NAME
$ RSH :== RSH /EIGHTBIT /ESCAPE_CHAR="+" /TRUNCATE_USER_NAME
$ !
The RCP (Remote Copy) command copies a file between your local
host and a remote internet host. You can also use RCP to copy a
file between two remote internet hosts. You specify the source
and destination file names, each in the format appropriate for
the source or destination system. For copying files from one
remote host to another:
o If you do not have proxy login accounts (or authentication
file entries) for both the source and remote hosts, you
must have the same user name and password on both source
and destination hosts. Use the /PASSWORD qualifier and,
if necessary, the /USER_NAME qualifier, to specify the
authentication information for the remote hosts.
o If you have a proxy login account (or authentication file
entry) on one of the remote hosts only, use the /PASSWORD
qualifier and, if necessary, the /USER_NAME qualifier to
specify the authentication information for the other host.
By using the /RECURSIVE qualifier with the RCP command, you can
recursively copy every file and subdirectory in a directory.
You can also use the COPY/RCP command to copy files across the
network using TCP/IP. For more information on this command, enter
HELP COPY/RCP at the DCL prompt.
Note that you can also use FTP to transfer files.
3.1 - Examples
The following examples show how to use RCP commands to copy files
from one host to another host:
1. User BEST has the account best on the UNIX host haven. User
BEST's password for that account is IMusici, which must be
enclosed in quotation marks because it is mixed case. The
following command copies the file /symph/nine on haven to
the local directory on the OpenVMS system (the UNIX file
specification must be enclosed in quotation marks, also):
$ RCP /PASSWORD="IMusici" "haven:/symph/nine" []<Return>
2. User BEST has a proxy account on the remote UNIX host musicx.
The following command copies the file /symph/pastoral from
host musicx to the directory [SYMPH6] on the device DKA300: on
BEST's local OpenVMS system:
$ RCP "musicx:/symph/pastoral" ":DKA300:[SYMPH6]" <Return>
3. With this command, user BEST copies each subtree rooted at
the /symph directory to the directory [SYMPHS] on the device
DKA300: on BEST's local OpenVMS system.
$ RCP/RECURSIVE "haven:/symph" ":DKA300:[SYMPHS]" <Return>
4. With the following command, user BEST copies all files
from the directory /symphonies on remote host musicx to the
directory /symph on remote host haven:
$ RCP /PASSWORD="IMusici" "musicx:/symphonies/*" "haven:/symph/*" <Return>
5. In the following example, user BEST uses the DCL COPY/RCP
command to transfer the complete subdirectory tree /symph from
remote UNIX host haven to remote OpenVMS host FRAM, which both
require specification of a password. (With the RCP command,
when transferring files between two remote hosts, you need a
proxy account or an entry in the authentication file for at
least one of the two remote hosts.) User BEST has an account
under the same name on both hosts.
$ COPY/RCP haven"BEST IMusici"::"/symph/*" <Return>
To: FRAM"VAUGHN MYLES"::[classic.compositions]*"
The RLOGIN (Remote Login) command connects your terminal to the
remote host you specify and requests a login. If the remote host
has an entry in its authentication files for your host and user
name, it may bypass its login and password prompts.
Note that you can also use TELNET to log in to remote internet
hosts.
End your remote login session in either of two ways:
o Log out from the remote host.
o On a new line, enter the escape character and a period.
The default escape character is a tilde ( ~ ). To set another
escape character, use the /ESCAPE_CHARACTER qualifier on the
RLOGIN command line.
4.1 - Examples
The following examples show how to use the RLOGIN command.
1. The following command logs in to node CONDO:
$ RLOGIN CONDO <Return>
CONDO - Unauthorized access is prohibited
Username: KING <Return>
Password: (password not echoed) <Return>
Welcome to OpenVMS (TM) Alpha Operating System, Version V7.1 on node CONDO
Last interactive login on Thursday, 24-SEP-1998 15:20:29.60
Last non-interactive login on Wednesday, 23-SEP-1998 14:25:04.12
$ RUN ...
$ ~. (characters not echoed)
%RLOGIN-S-LCLCLOSED, Local connection closed
$
2. The following command logs in to host petrel and changes the
character used to close the RLOGIN session:
$ RLOGIN /ESCAPE_CHARACTER="+" PETREL <Return>
.
.
.
Last login: Mon Mar 14 18:34:27 from phoebe.edu
UNIX System petrel: Fri Mar 19 11:02:20 EST 1997
Mon Jun 28 18:44:42 EST 1997
% ls ... <Return>
% +. (characters not echoed)
%RLOGIN-S-REMCLOSED, Remote connection closed
$
The RSH (Remote Shell) command connects your terminal to a remote
host and requests it to execute the command, script, or command
procedure that you specify. If the command generates output,
you see it as if it were produced locally. If you omit a remote
command when you enter an RSH command line, RSH initiates an
RLOGIN session. However, if the command line includes /PASSWORD,
the remote login attempt fails. Using the /PASSWORD qualifier
invokes REXEC.
Syntax rules require that you enter your RSH command line so that
the remote command is the last word (or phrase).
Quotation Marks
If the remote command is one or more lowercase words, you do not
need to enclose them in double quotation marks on the RSH command
line. However, double quotation marks ( " " ) are required for:
o UNIX commands that are mixed-case characters.
o UNIX commands that are uppercase characters.
In addition, RSH handles one double quotation mark ( " ) and two
consecutive double quotation marks ( "" ) as follows:
o If you input one double quotation mark in a command line, RSH
removes it.
o If you enter two consecutive double quotation marks on the
command line, RSH removes the first quotation mark and leaves
the second.
o If you surround text with a set of double quotation marks on
the RSH command line, RSH disables the default conversion of
characters to lowercase, and removes the quotation marks.
Interrupting Commands
To stop a remote execution, enter either Ctrl/C or Ctrl/Y.
5.1 - Examples
The following examples show how to use the RSH command.
1. In this example, the remote system manager previously created
an entry in the authentication files for remote user STAN on
host oster giving STAN permission to access user rolly.
From the local OpenVMS host, user STAN views rolly's
directory, which resides on UNIX system oster. No quotes are
required around the user name and host name because RSH by
default sends them in lowercase.
$ RSH /USER_NAME=ROLLY OSTER LS
2. On the following RSH command line, the uppercase UNIX
qualifier -R is entered within quotation marks to preserve the
uppercase R. This example assumes that the user's originating
host and user name are in the authentication files on the
remote host debts.
$ RSH DEBTS LS "-R"
3. The following commands show how RSH sends quotation marks to
a remote UNIX host and how quotation marks affect case. All
examples assume that the user's originating host and user name
are in the authentication files on the remote host.
$ RSH DEBTS ECHO TEST MESSAGE
test message
$ RSH DEBTS ECHO "\""test\"" message"
"test" message
$ RSH DEBTS ECHO TEST MESSAGE
test message
$ RSH DEBTS ECHO "TEST" MESSAGE
TEST message
$ RSH DEBTS "echo '""test"" message'"
"test" message
4. Because no remote command is specified on the RSH command
line, DIGITAL TCP/IP Services for OpenVMS executes RLOGIN.
$ RSH MOON01 <Return>
Password: (password not echoed)<Return>
Last successful login for jjones: Fri Sep 25 10:58:31 1998 from nebula
Last unsuccessful login for jjones: Fri Sep 25 11:59:43 1998 on ttyp5
Digital UNIX V5.0 (Rev. 148); Tue Apr 7 18:32:54 EST 1998
Digital Equipment Corporation
Internal Use Only
moon01>
5. In this example, the OpenVMS system manager of WR2 previously
created an entry in the authentication files for remote user
SIMMS on host WR1.
From OpenVMS host WR1, user SIMMS enters the DIRECTORY command
to execute at WR2.
$ RSH WR2 DIRECTORY
6. In this example, the OpenVMS system manager of WR2 previously
created an entry in the authentication files for remote user
SIMMS on host WR1 allowing SIMMS access to the user name
ROGERS.
User SIMMS enters the DIRECTORY command from WR1 to execute at
WR2 in user account ROGERS.
$ RSH WR2 /USER=ROGERS DIRECTORY
Use the REXEC feature to send a command to execute on a remote
host that does not have, or might not have, the authentication
information that RSH requires. The remote system's authentication
files are not used.
Along with the remote command, REXEC sends the password you
specify on the command line to the remote host. This password
is used for security checking.
The Remote Shell program invokes REXEC. To use REXEC, enter
RSH /PASSWORD.
6.1 - Examples
The following example shows how to provide password information
for the RSH command, thereby invoking the REXEC feature on the
remote host.
From host GRANT, user STANTON enters the file tops.holdings that
resides on UNIX host oster. Because STANTON is not listed in
oster's authentication files, user STANTON must use the REXEC
feature and supply the /USER_NAME and /PASSWORD qualifiers.
Quotes are required around the password because it contains
uppercase letters.
$ RSH OSTER /USER_NAME=STANTON /PASSWORD="KeepingSaneJoy" -
_$ CAT TOPS.HOLDINGS
[legal]
[privacy]
[GNU]
[policy]
[netiquette]
[sponsors]
[FAQ]
Polarhome, production since 1999.
Member of Polarhome portal.