[Search for users] [Overall Top Noters] [List of all Conferences] [Download this site]

Conference lassie::ucx

Title:DEC TCP/IP Services for OpenVMS
Notice:Note 2-SSB Kits, 3-FT Kits, 4-Patch Info, 7-QAR System
Moderator:ucxaxp.ucx.lkg.dec.com::TIBBERT
Created:Thu Nov 17 1994
Last Modified:Fri Jun 06 1997
Last Successful Update:Fri Jun 06 1997
Number of topics:5568
Total number of notes:21492

5238.0. "RCP from remote SUN not copying files -- UCX 4.1 ECO 4" by CSC32::R_WILLIAMS () Tue Feb 18 1997 15:00

    OpenVMS VAX V6.2 UCX 4.1 ECO 4
    
    Hi,
    
    I have been working with a customer that is having problems with RCP
    commands from a remote Sun system.  He has clarified his problem below. 
    Is there a later RSH/RCP image that this customer could try or that
    would help his situation.  Let me know if I should elevate this as a
    formal escalation.
    
    Thanks,
    
    -Rick
    
Based on some of your questions, I think I may not have been clear in
describing the problem.

RCP works fine transferring files either direction when the command is
originated on a VAX using UCX with an appropriate entry in the .RHOSTS
file on the remote node.

The problem we are having occurs when the RCP command originates at a
remote host.  Using RCP on a remote host, we can RCP a file TO a VAX fine.
We cannot use RCP on a remote host to obtain a file FROM a VAX.

With that hopefully clarified, the answers to your requests follow:

 Q: What happens if you use the /USER= and /PASS= qualifiers and not use
    the proxy method? Will this work?

 A: RCP on the SUN does not have /PASS option or an equivalent.  We
    are using the equivalent of the /USER option by specifying the
    username on the file reference (required anyway).  The command I am
    testing with is:  rcp thompson@tmpmv2:test.test test.test
    

 Q: Can you send me a log sampling with OPCOM enabled of the command
    that you are using with RSH. Just want to verify that there are
    no RSH OPCOM messages. 

 A: I did a REPLY/ENABLE on the VAX node, then issued the RCP on the SUN.

    Display log from the SUN (node51)
        node51# rcp thompson@tmpmv2:test.test test.test

        node51# 

    Display log from VAX (TMPMV2):
        MV2;$ 
        %%%%%%%%%%%  OPCOM  18-FEB-1997 10:00:14.66  %%%%%%%%%%%
        Message from user INTERnet on TMPMV2
        INTERnet ACP RSH Accept Request from Host: 144.15.42.75 Port: 1023

        MV2;$ 

 Q: Are there any log files on the Sun system that we can look at? Are
    you seeing a blank line added when doing the command?

    There is no log file that I am aware of.  We do get a blank line
    (see log above) after the RCP command is issued.  The response back
    is so quick, however, I am not sure much is being done.

 Q: Can you forward output from  '$ UCX SHO VERSION/ALL'.

MV2;$ ucx show version/all

  Digital TCP/IP Services for OpenVMS VAX Version V4.1 - ECO Level 4
  on a VAX 4000-100 running OpenVMS V6.2    

     Image name               Image ID         Link Date    Image location

CORE environment:
  UCX$ACCESS_SHR;9           UCX V4.1-12A     27-NOV-1996 SYS$COMMON:[SYSLIB]
  UCX$BGDRIVER;10            UCX V4.1-12P     27-NOV-1996 SYS$COMMON:[SYS$LDR]
  UCX$INETACP;10             UCX V4.1-12P     27-NOV-1996 SYS$COMMON:[SYSEXE]
  UCX$INETDRIVER;9           UCX V4.1-12      16-JUL-1996 SYS$COMMON:[SYS$LDR]
  UCX$INET_ROUTING;5         UCX V4.1-12      16-JUL-1996 SYS$COMMON:[SYSEXE]
  UCX$INTERNET_SERVICES_V6;10
                             UCX V4.1-12P     27-NOV-1996 SYS$COMMON:[SYS$LDR]
  UCX$IPC_SHR;7              UCX V4.1-12      16-JUL-1996 SYS$COMMON:[SYSLIB]
  UCX$MSG;5                  UCX V4.1-12      16-JUL-1996 SYS$COMMON:[SYSMSG]
  UCX$PING;6                 UCX V4.1-12      16-JUL-1996 SYS$COMMON:[SYSEXE]
  UCX$SDA;4                  UCX V4.1-12      16-JUL-1996 SYS$COMMON:[SYSLIB]
  UCX$TRACE;4                UCX V4.1-12G     26-SEP-1996 SYS$COMMON:[SYSEXE]
  UCX$UCP;10                 UCX V4.1-12A     20-NOV-1996 SYS$COMMON:[SYSEXE]
  UCX$VERSIONS;10            UCX V4.1-12      20-JAN-1997 SYS$COMMON:[SYSEXE]

BIND:
  UCX$BIND_SERVER;6          UCX V4.1-12      16-JUL-1996 SYS$COMMON:[SYSEXE]
  UCX$BIND_SERVER_XFER;6     UCX V4.1-12      16-JUL-1996 SYS$COMMON:[SYSEXE]
  UCX$BIND_VALIDATE_SETUP;2  UCX V4.1-12      18-JUL-1996 SYS$COMMON:[SYSEXE]
  UCX$METRIC;2               UCX V4.1-12      16-JUL-1996 SYS$COMMON:[SYSEXE]
  UCX$METRICVIEW;2           UCX V4.1-12      16-JUL-1996 SYS$COMMON:[SYSEXE]
  UCX$NSLOOKUP;6             UCX V4.1-12      16-JUL-1996 SYS$COMMON:[SYSEXE]

MAIL:
  UCX$POP_SERVER;2           UCX V4.1-12A     27-NOV-1996 SYS$COMMON:[SYSEXE]
  UCX$SMTP_MAILSHR;10        UCX V4.1-12A     27-NOV-1996 SYS$COMMON:[SYSLIB]
  UCX$SMTP_PARSESHR;10       UCX V4.1-12A     27-NOV-1996 SYS$COMMON:[SYSLIB]
  UCX$SMTP_RECEIVER;10       UCX V4.1-12A     27-NOV-1996 SYS$COMMON:[SYSEXE]
  UCX$SMTP_SYMBIONT;10       UCX V4.1-12A     27-NOV-1996 SYS$COMMON:[SYSEXE]
  UCX$UUDECODE;10            UCX V4.1-12A     27-NOV-1996 SYS$COMMON:[SYSEXE]
  UCX$UUENCODE;10            UCX V4.1-12A     27-NOV-1996 SYS$COMMON:[SYSEXE]

Network File System:
  UCX$CFS_SHR;9              UCX V4.1-12      16-JUL-1996 SYS$COMMON:[SYSLIB]
  UCX$DNFSACP_V6;6           UCX V4.1-12      16-JUL-1996 SYS$COMMON:[SYSEXE]
  UCX$DNFSDISMOUNT_V6;4      UCX V4.1-12      16-JUL-1996 SYS$COMMON:[SYSEXE]
  UCX$DNFSDRIVER_V6;4        UCX V4.1-12      16-JUL-1996 SYS$COMMON:[SYS$LDR]
  UCX$DNFSMOUNT_V6;4         UCX V4.1-12      16-JUL-1996 SYS$COMMON:[SYSEXE]
  UCX$PCNFSD;6               UCX V4.1-12      16-JUL-1996 SYS$COMMON:[SYSEXE]
  UCX$SERVER_NFS;6           UCX V4.1-12      16-JUL-1996 SYS$COMMON:[SYSEXE]

Network Management:
  UCX$ESNMP_SERVER;1         UCX V4.1-12      23-JUL-1996 SYS$COMMON:[SYSEXE]
  UCX$ESNMP_SHR;1            UCX V4.1-12      23-JUL-1996 SYS$COMMON:[SYSLIB]
  UCX$MIBCOMP;1              UCX V4.1-12      23-JUL-1996 SYS$COMMON:[SYSEXE]
  UCX$MOSY;1                 UCX V4.1-12      23-JUL-1996 SYS$COMMON:[SYSEXE]
  UCX$OS_MIBS;1              UCX V4.1-12      23-JUL-1996 SYS$COMMON:[SYSEXE]
  UCX$SNMPI;1                UCX V4.1-12      23-JUL-1996 SYS$COMMON:[SYSEXE]
  UCX$SNMP_REQUEST;1         UCX V4.1-12      23-JUL-1996 SYS$COMMON:[SYSEXE]

Printing Services:
  UCX$TELNETSYM;10           UCX V4.1-12E     23-JAN-1997 SYS$COMMON:[SYSEXE]
  UCX$LPD_RCV;10             UCX V4.1-12E     23-JAN-1997 SYS$COMMON:[SYSEXE]
  UCX$LPD_SHR;10             UCX V4.1-12E     23-JAN-1997 SYS$COMMON:[SYSLIB]
  UCX$LPD_SMB;10             UCX V4.1-12E     23-JAN-1997 SYS$COMMON:[SYSEXE]
  UCX$LPQ;10                 UCX V4.1-12E     23-JAN-1997 SYS$COMMON:[SYSEXE]
  UCX$LPRM;10                UCX V4.1-12E     23-JAN-1997 SYS$COMMON:[SYSEXE]
  UCX$LPRSETUP;10            UCX V4.1-12E     23-JAN-1997 SYS$COMMON:[SYSEXE]

PWIP:
  PWIP$SDA;1                 UCX V4.1-12      16-JUL-1996 SYS$COMMON:[SYSLIB]
  UCX$PWIPACP;9              UCX V4.1-12      16-JUL-1996 SYS$COMMON:[SYSEXE]
  UCX$PWIPDRIVER;9           UCX V4.1-12      16-JUL-1996 SYS$COMMON:[SYS$LDR]
  UCX$PWIPSHUT;7             UCX V4.1-12      16-JUL-1996 SYS$COMMON:[SYSEXE]

Remote Procedure Call:
  UCX$PORTMAPPER;8           UCX V4.1-12      16-JUL-1996 SYS$COMMON:[SYSEXE]
  UCX$RPCGEN;2               UCX V4.1-12      16-JUL-1996 SYS$COMMON:[SYSEXE]
  UCX$RPCINFO;8              UCX V4.1-12      16-JUL-1996 SYS$COMMON:[SYSEXE]
  UCX$RPCXDR_SHR;9           UCX V4.1-12      16-JUL-1996 SYS$COMMON:[SYSLIB]

Services:
  UCX$BOOTP;10               UCX V4.1-12A     23-OCT-1996 SYS$COMMON:[SYSEXE]
  UCX$FINGER;2               UCX V4.1-12B     18-SEP-1996 SYS$COMMON:[SYSEXE]
  UCX$FINGER_SERVER;2        UCX V4.1-12B     18-SEP-1996 SYS$COMMON:[SYSEXE]
  UCX$FTP;9                  UCX V4.1-12      16-JUL-1996 SYS$COMMON:[SYSEXE]
  UCX$FTPC;12                UCX V4.1-12A     11-OCT-1996 SYS$COMMON:[SYSEXE]
  UCX$FTPD;12                UCX V4.1-12A     11-OCT-1996 SYS$COMMON:[SYSEXE]
  UCX$NTPD;5                 UCX V4.1-12      16-JUL-1996 SYS$COMMON:[SYSEXE]
  UCX$RCP;5                  UCX V4.1-12      16-JUL-1996 SYS$COMMON:[SYSEXE]
  UCX$RLOGIN;5               UCX V4.1-12      16-JUL-1996 SYS$COMMON:[SYSEXE]
  UCX$RSH;9                  UCX V4.1-12      16-JUL-1996 SYS$COMMON:[SYSEXE]
  UCX$TFTP;9                 UCX V4.1-12A     23-OCT-1996 SYS$COMMON:[SYSEXE]

TELNET:
  UCX$TELNET;10              UCX V4.1-12C      4-DEC-1996 SYS$COMMON:[SYSEXE]
  UCX$TNDRIVER;10            UCX V4.1-12D      5-DEC-1996 SYS$COMMON:[SYS$LDR]


 Q: Can you turn on TCPIPTRACE and send the output.  Do a '$ HELP TCPIPTRACE'
    and see what qualifiers you could use to focus on the RSH issue with RCP.

 A: MV2;$ tcpiptrace node51/full/port=local=514/protocol=tcp/output=trace.dat

    Contents of TRACE.DAT:

---------------------------------------------------------------------------

   TCPIPtrace full display RCV packet 1 at 18-FEB-1997 10:35:11.21

   IP Version = 4,  IHL = 5,  TOS = 00,   Total Length = 44 = ^x002C
   IP Identifier  = ^x339E,  Flags (0=0,DF=0,MF=0),
         Fragment Offset = 0 = ^x0000,   Calculated Offset = 0 = ^x0000
   IP TTL = 60 = ^x3C,  Protocol = 6 = ^x06,  Header Checksum = ^xD67D
   IP Source Address      = 144.15.42.75
   IP Destination Address = 144.15.42.71

   TCP Source Port = 1022,  TCP Destination Port = 514
   TCP Sequence Number      = 1575552000 = ^x5DE90400
   TCP Acknowledge Number   = 0 = ^x00000000
       Flags (URG=0,ACK=0,PSH=0,RST=0,SYN=1,FIN=0),
                                           Window = 4096 = ^x1000
   TCP Checksum = ^xAB8C,   Urgent Pointer = 0 = ^x0000

   TCP Option = 2 MAXSEG Option Length = 4, Segment Size = 1460 = ^x05B4

   4B2A0F90   7DD6063C   00009E33   2C000045    0000    E..,3...<..}..*K
   00000000   0004E95D   0202FE03 | 472A0F90    0010    ..*G....].......
       0010 | B4050402   00008CAB   00100260    0020    `.............
---------------------------------------------------------------------------

   TCPIPtrace full display XMT packet 2 at 18-FEB-1997 10:35:11.21

   IP Version = 4,  IHL = 5,  TOS = 00,   Total Length = 44 = ^x002C
   IP Identifier  = ^x9EAF,  Flags (0=0,DF=0,MF=0),
         Fragment Offset = 0 = ^x0000,   Calculated Offset = 0 = ^x0000
   IP TTL = 128 = ^x80,  Protocol = 6 = ^x06,  Header Checksum = ^x276C
   IP Source Address      = 144.15.42.71
   IP Destination Address = 144.15.42.75

   TCP Source Port = 514,  TCP Destination Port = 1022
   TCP Sequence Number      = 1668352000 = ^x63710800
   TCP Acknowledge Number   = 1575552001 = ^x5DE90401
       Flags (URG=0,ACK=1,PSH=0,RST=0,SYN=1,FIN=0),
                                           Window = 4096 = ^x1000
   TCP Checksum = ^x400E,   Urgent Pointer = 0 = ^x0000

   TCP Option = 2 MAXSEG Option Length = 4, Segment Size = 1456 = ^x05B0

   472A0F90   6C270680   0000AF9E   2C000045    0000    E..,......'l..*G
   0104E95D   00087163   FE030202 | 4B2A0F90    0010    ..*K....cq..]...
            | B0050402   00000E40   00101260    0020    `...@.......
---------------------------------------------------------------------------

   TCPIPtrace full display RCV packet 3 at 18-FEB-1997 10:35:11.21

   IP Version = 4,  IHL = 5,  TOS = 00,   Total Length = 40 = ^x0028
   IP Identifier  = ^x339F,  Flags (0=0,DF=0,MF=0),
         Fragment Offset = 0 = ^x0000,   Calculated Offset = 0 = ^x0000
   IP TTL = 60 = ^x3C,  Protocol = 6 = ^x06,  Header Checksum = ^xD680
   IP Source Address      = 144.15.42.75
   IP Destination Address = 144.15.42.71

   TCP Source Port = 1022,  TCP Destination Port = 514
   TCP Sequence Number      = 1575552001 = ^x5DE90401
   TCP Acknowledge Number   = 1668352001 = ^x63710801
       Flags (URG=0,ACK=1,PSH=0,RST=0,SYN=0,FIN=0),
                                           Window = 4096 = ^x1000
   TCP Checksum = ^x57C7,   Urgent Pointer = 0 = ^x0000

   4B2A0F90   80D6063C   00009F33   28000045    0000    E..(3...<.....*K
   01087163   0104E95D   0202FE03 | 472A0F90    0010    ..*G....]...cq..
       0000   B0050402 | 0000C757   00101050    0020    P...W.........
---------------------------------------------------------------------------

   TCPIPtrace full display RCV packet 4 at 18-FEB-1997 10:35:11.21

   IP Version = 4,  IHL = 5,  TOS = 00,   Total Length = 41 = ^x0029
   IP Identifier  = ^x33A0,  Flags (0=0,DF=0,MF=0),
         Fragment Offset = 0 = ^x0000,   Calculated Offset = 0 = ^x0000
   IP TTL = 60 = ^x3C,  Protocol = 6 = ^x06,  Header Checksum = ^xD67E
   IP Source Address      = 144.15.42.75
   IP Destination Address = 144.15.42.71

   TCP Source Port = 1022,  TCP Destination Port = 514
   TCP Sequence Number      = 1575552001 = ^x5DE90401
   TCP Acknowledge Number   = 1668352001 = ^x63710801
       Flags (URG=0,ACK=1,PSH=1,RST=0,SYN=0,FIN=0),
                                           Window = 4096 = ^x1000
   TCP Checksum = ^x57BE,   Urgent Pointer = 0 = ^x0000

   4B2A0F90   7ED6063C   0000A033   29000045    0000    E..)3...<..~..*K
   01087163   0104E95D   0202FE03 | 472A0F90    0010    ..*G....]...cq..
       0010   02600000 | 0000BE57   00101850    0020    P...W.....`...
---------------------------------------------------------------------------

   TCPIPtrace full display XMT packet 5 at 18-FEB-1997 10:35:11.23

   IP Version = 4,  IHL = 5,  TOS = 00,   Total Length = 40 = ^x0028
   IP Identifier  = ^x9EB0,  Flags (0=0,DF=0,MF=0),
         Fragment Offset = 0 = ^x0000,   Calculated Offset = 0 = ^x0000
   IP TTL = 128 = ^x80,  Protocol = 6 = ^x06,  Header Checksum = ^x276F
   IP Source Address      = 144.15.42.71
   IP Destination Address = 144.15.42.75

   TCP Source Port = 514,  TCP Destination Port = 1022
   TCP Sequence Number      = 1668352001 = ^x63710801
   TCP Acknowledge Number   = 1575552002 = ^x5DE90402
       Flags (URG=0,ACK=1,PSH=0,RST=0,SYN=0,FIN=0),
                                           Window = 4095 = ^x0FFF
   TCP Checksum = ^x57C7,   Urgent Pointer = 0 = ^x0000

   472A0F90   6F270680   0000B09E   28000045    0000    E..(......'o..*G
   0204E95D   01087163   FE030202 | 4B2A0F90    0010    ..*K....cq..]...
                       | 0000C757   FF0F1050    0020    P...W...
---------------------------------------------------------------------------

   TCPIPtrace full display RCV packet 6 at 18-FEB-1997 10:35:11.23

   IP Version = 4,  IHL = 5,  TOS = 00,   Total Length = 71 = ^x0047
   IP Identifier  = ^x33A1,  Flags (0=0,DF=0,MF=0),
         Fragment Offset = 0 = ^x0000,   Calculated Offset = 0 = ^x0000
   IP TTL = 60 = ^x3C,  Protocol = 6 = ^x06,  Header Checksum = ^xD65F
   IP Source Address      = 144.15.42.75
   IP Destination Address = 144.15.42.71

   TCP Source Port = 1022,  TCP Destination Port = 514
   TCP Sequence Number      = 1575552002 = ^x5DE90402
   TCP Acknowledge Number   = 1668352001 = ^x63710801
       Flags (URG=0,ACK=1,PSH=1,RST=0,SYN=0,FIN=0),
                                           Window = 4096 = ^x1000
   TCP Checksum = ^xCC1D,   Urgent Pointer = 0 = ^x0000

   4B2A0F90   5FD6063C   0000A133   47000045    0000    E..G3...<.._..*K
   01087163   0204E95D   0202FE03 | 472A0F90    0010    ..*G....]...cq..
   6F687400   746F6F72 | 00001DCC   00101850    0020    P.......root.tho
   73657420   662D2070   6372006E   6F73706D    0030    mpson.rcp -f tes
                           007473   65742E74    0040    t.test.
---------------------------------------------------------------------------

   TCPIPtrace full display XMT packet 7 at 18-FEB-1997 10:35:11.43

   IP Version = 4,  IHL = 5,  TOS = 00,   Total Length = 40 = ^x0028
   IP Identifier  = ^x9EB1,  Flags (0=0,DF=0,MF=0),
         Fragment Offset = 0 = ^x0000,   Calculated Offset = 0 = ^x0000
   IP TTL = 128 = ^x80,  Protocol = 6 = ^x06,  Header Checksum = ^x276E
   IP Source Address      = 144.15.42.71
   IP Destination Address = 144.15.42.75

   TCP Source Port = 514,  TCP Destination Port = 1022
   TCP Sequence Number      = 1668352001 = ^x63710801
   TCP Acknowledge Number   = 1575552033 = ^x5DE90421
       Flags (URG=0,ACK=1,PSH=0,RST=0,SYN=0,FIN=0),
                                           Window = 4064 = ^x0FE0
   TCP Checksum = ^x57C7,   Urgent Pointer = 0 = ^x0000

   472A0F90   6E270680   0000B19E   28000045    0000    E..(......'n..*G
   2104E95D   01087163   FE030202 | 4B2A0F90    0010    ..*K....cq..]..!
                       | 0000C757   E00F1050    0020    P...W...
---------------------------------------------------------------------------

   TCPIPtrace full display XMT packet 26 at 18-FEB-1997 10:35:12.99

   IP Version = 4,  IHL = 5,  TOS = 00,   Total Length = 41 = ^x0029
   IP Identifier  = ^x9EBB,  Flags (0=0,DF=0,MF=0),
         Fragment Offset = 0 = ^x0000,   Calculated Offset = 0 = ^x0000
   IP TTL = 128 = ^x80,  Protocol = 6 = ^x06,  Header Checksum = ^x2763
   IP Source Address      = 144.15.42.71
   IP Destination Address = 144.15.42.75

   TCP Source Port = 514,  TCP Destination Port = 1022
   TCP Sequence Number      = 1668352001 = ^x63710801
   TCP Acknowledge Number   = 1575552033 = ^x5DE90421
       Flags (URG=0,ACK=1,PSH=1,RST=0,SYN=0,FIN=0),
                                           Window = 4064 = ^x0FE0
   TCP Checksum = ^x57BE,   Urgent Pointer = 0 = ^x0000

   472A0F90   63270680   0000BB9E   29000045    0000    E..)......'c..*G
   2104E95D   01087163   FE030202 | 4B2A0F90    0010    ..*K....cq..]..!
                    00 | 0000BE57   E00F1850    0020    P...W....
---------------------------------------------------------------------------

   TCPIPtrace full display RCV packet 27 at 18-FEB-1997 10:35:12.99

   IP Version = 4,  IHL = 5,  TOS = 00,   Total Length = 41 = ^x0029
   IP Identifier  = ^x33A2,  Flags (0=0,DF=0,MF=0),
         Fragment Offset = 0 = ^x0000,   Calculated Offset = 0 = ^x0000
   IP TTL = 60 = ^x3C,  Protocol = 6 = ^x06,  Header Checksum = ^xD67C
   IP Source Address      = 144.15.42.75
   IP Destination Address = 144.15.42.71

   TCP Source Port = 1022,  TCP Destination Port = 514
   TCP Sequence Number      = 1575552033 = ^x5DE90421
   TCP Acknowledge Number   = 1668352002 = ^x63710802
       Flags (URG=0,ACK=1,PSH=1,RST=0,SYN=0,FIN=0),
                                           Window = 4096 = ^x1000
   TCP Checksum = ^x579D,   Urgent Pointer = 0 = ^x0000

   4B2A0F90   7CD6063C   0000A233   29000045    0000    E..)3...<..|..*K
   02087163   2104E95D   0202FE03 | 472A0F90    0010    ..*G....]..!cq..
       0002   00520400 | 00009D57   00101850    0020    P...W.....R...
---------------------------------------------------------------------------

   TCPIPtrace full display XMT packet 30 at 18-FEB-1997 10:35:13.03

   IP Version = 4,  IHL = 5,  TOS = 00,   Total Length = 40 = ^x0028
   IP Identifier  = ^x9EBD,  Flags (0=0,DF=0,MF=0),
         Fragment Offset = 0 = ^x0000,   Calculated Offset = 0 = ^x0000
   IP TTL = 128 = ^x80,  Protocol = 6 = ^x06,  Header Checksum = ^x2762
   IP Source Address      = 144.15.42.71
   IP Destination Address = 144.15.42.75

   TCP Source Port = 514,  TCP Destination Port = 1022
   TCP Sequence Number      = 1668352002 = ^x63710802
   TCP Acknowledge Number   = 1575552034 = ^x5DE90422
       Flags (URG=0,ACK=1,PSH=0,RST=0,SYN=0,FIN=0),
                                           Window = 4063 = ^x0FDF
   TCP Checksum = ^x57C6,   Urgent Pointer = 0 = ^x0000

   472A0F90   62270680   0000BD9E   28000045    0000    E..(......'b..*G
   2204E95D   02087163   FE030202 | 4B2A0F90    0010    ..*K....cq..].."
                       | 0000C657   DF0F1050    0020    P...W...

T.RTitleUserPersonal
Name
DateLines
5238.1LASSIE::GEMIGNANITue Feb 18 1997 18:0915
    Rick-
    	Unfortunately, this is going to take more time to solve than a few
    minutes.  I do see that the user is attempting (as thompson) to receive
    a file from an OpenVMS host.  I also see the UCX acknowledgement (NULL)
    and then something sent by the client to which UCX sends another ACK.
    The connection then seems to go dead.  Why, I cannot tell. (I am also
    not such a big RCP guru although the problem is going to be directed to
    me, I'm sure.)
    
    	Therefore, please submit an IPMT for this case.  Be sure to reference
    this note.
    
    	Sorry that I couldn't give you a quicker answer.
    
    -John
5238.2same problemMUNICH::WOERLEFri Feb 21 1997 08:4953
			hello Rick and John,

a customer of mine has the same problem like you described.

The customer has UCX 4.0 ECO4.

I can reproduce the problem at my side

1)  D-UNIX (3.2) ---->  UCX (4.0 ECO2 and UCX 4.1 ECO4) :

munftz> rcp norbert@wein:login.com aa.txt

munftz> rcp norbert@mdsc21:login.com aa.txt

munftz>

In both cases there are no errormessages but the file aa.txt isn't
copied:
munftz> ls aa.txt
aa.txt not found

(the same results with testing Ultrix 4.2 and UCX 4.0/4.1)

2) Now I want copy the file from VMS to VMS
WEIN> rcp mdsc21:login.com aa.txt
%RCP-E-INVRESP, invalid response from remote system

(where mdsc21 = UCX 4.1/ECO4 and wein=UCX 4.0/ECO2)
But for this problem there is already an open IPMT (CFS.48214)

So it seems for me that the RCP-Server on UCX has a problem when
getting files from other nodes (UNIX or VMS)
( RCP-Client>  rcp <RCP-Server=UCX>:<file>   <localfile>)


In the last reply :
.-1"Therefore, please submit an IPMT for this case.  Be sure to reference
    this note."

I have only found CFS.46898 (RCP fails from AIX system to UCX 4.0).
But this IPMT is opened in DEC-1996 and is closed in DEC-1996
with the workaround that RSH is working fine
(if I have understood this solution correctly)

At my side RSH is working also fine but RCP has these problems.

Now my question: is this problem already addressed to Engineering
or should I open a new IPMT.


Kind regards

Norbert Woerle, CSC Munich
5238.3CSC32::R_WILLIAMSFri Feb 21 1997 11:245
    Norbert,
    
    I elevated this via IPMT.  Nothing back yet.
    
    -Rick
5238.5Broke in 4.0 ECO 5 too.CSC32::SMILEYWed Mar 12 1997 19:205
    
    I have the same failure under V4.0 ECO 5 (not surprising) - any word on
    a fix?
    
    -Smiley
5238.6LASSIE::GEMIGNANIThu Mar 13 1997 18:271
    Not yet; I'm closing out FTP fixes at the moment.
5238.7any news ?MUNICH::WOERLEMon Apr 28 1997 10:3317
    		hello,
           
    any news ?
    sorry, but my customer asks for a fix (he is waiting for 2 months).
    
    When will a fix be available ? 
    I have installed PAT8 UCX 4.1 but the problem still always exists
    
    The corresponding IPMT (CFS.49009) is opened with level 3 priority. 
    Should I open an IPMT with level 2 to give this problem a higher
    priority or do you have a fix in the next days ?
    
    
    Kind regards
                                                                    
    Norbert Woerle, CSC Munich
                                                                    
5238.8No news is good news....LADDIE::TIBBERTLee Tibbert, DTN 226-6115Tue Apr 29 1997 18:4822

Norbert,

	There are already there or four IPMT cases, at least
two at level 2, on this issue.

The basic problem is that RCP 'gets' or 'pulls' from any
remote system are broken on UCX 4.1 (sadly).  A quite
experienced UCX engineer volunteered to look at these cases
before they get transferred to the current (new) RCP maintainer.
(yes, that implies that the Rcommand will soon have a 
dedicated maintainer. That should improve the response time 
to Rcommand IPMTs).

Expect an update through the IPMT system when this 
case is fixed.

I hope this helps,

Lee
_not_ the RCP maintainer.