I'm trying to use scp on a Linux server to transfer a file from our Alpha
OpenVMS system to the Linux server using password authentication.

I am obviously doing something (or maybe many things) wrong but I don't find
anything in the admin guide to help with this.

The scp command on the Linux side doesn't seem to me that it would be valid
on the Alpha side, but I don't know how else to formulate the command.

I've set the Multinet debug level on our Alpha to 6.

The command I'm using on the Linux side is:

scp -v "my-Alpha-useraccount@Alpha-host-name:dev:[dir]remotefilename.txt"
localfilename.txt

I've tried this operation alternately with my Alpha Multinet host key
generated as ssh1 and then as ssh2.

I am accomplishing the remote logon from the Linux system to the Alpha, but
the file transfer is failing.

When I generate an ssh2-type host key, the [multinet.ssh]sshd.log file looks
like this:

SSHD 0006[000009D5]: WARNING: Host key pair is not specified, trying to use
default 'multinet_ssh2_hostkey_dir:hostkey.'.


When I generate an ssh1-type host key, the [multinet.ssh]sshd.log file is
very long and detailed so I'm including only the end of the file:

debug[00000DD9]: (19:31:00)Pty-VMS/PTY-VMS.C;3:422: read ast: for subsystem,
read 0 bytes
debug[00000DD9]: (19:31:00)Pty-VMS/PTY-VMS.C;3:388: read ast: status 1
bytes 11 buffered 1 remain 91999
debug[00000DD9]: (19:31:00)Pty-VMS/PTY-VMS.C;3:422: read ast: for subsystem,
read 0 bytes
debug[00000DD9]: (19:31:01)Pty-VMS/PTY-VMS.C;3:547: vms_pty_write: writing
1
debug[00000DD9]: (19:31:01)Pty-VMS/PTY-VMS.C;3:388: read ast: status 1
bytes 1 buffered 1 remain 91999
debug[00000DD9]: (19:31:01)Pty-VMS/PTY-VMS.C;3:422: read ast: for subsystem,
read 0 bytes
debug[00000DD9]: (19:31:01)Pty-VMS/PTY-VMS.C;3:388: read ast: status 1
bytes 5 buffered 1 remain 91999
debug[00000DD9]: (19:31:01)Pty-VMS/PTY-VMS.C;3:422: read ast: for subsystem,
read 0 bytes
debug[00000DD9]: (19:31:01)Pty-VMS/PTY-VMS.C;3:388: read ast: status 1
bytes 52 buffered 1 remain 91999
debug[00000DD9]: (19:31:01)Pty-VMS/PTY-VMS.C;3:422: read ast: for subsystem,
read 0 bytes
debug[00000DD9]: (19:31:01)Pty-VMS/PTY-VMS.C;3:388: read ast: status 1
bytes 1 buffered 1 remain 91999
debug[00000DD9]: (19:31:01)Pty-VMS/PTY-VMS.C;3:422: read ast: for subsystem,
read 0 bytes
debug[00000DD9]: (19:31:01)Pty-VMS/PTY-VMS.C;3:307: PTD device _FTA570:
disconnected
debug[00000DD9]: (19:31:01)Ssh2ChannelSession/SSHVMSCHSESSION.C;13:3226: ef
cluster 0 freed
debug[00000DD9]: ssh_pty_sigchld_handler
debug[00000DD9]: (19:31:01)Pty-VMS/PTY-VMS.C;3:388: read ast: status 2c
bytes 0 buffered 1 remain 91999
debug[00000DD9]: ssh_pty_sigchld_do_callback
debug[00000DD9]: (19:31:01)SshConnection/SSHCONN.C;1:405: EOF from channel
stream
debug[00000DD9]: (19:31:01)Ssh2ChannelSession/SSHVMSCHSESSION.C;13:2260: eof
received from interactive command - command exited
debug[00000DD9]: (19:31:01)SshUnxixFdStream/SSHUNIXFDSTREAM.C;1:396: writing
64 bytes
debug[00000DD9]: (19:31:01)SshUnxixFdStream/SSHUNIXFDSTREAM.C;1:396: writing
32 bytes
debug[00000DD9]: (19:31:01)Ssh2Transport/TRCOMMON.C;2:1930: Received
EOF.
debug[00000DD9]: (19:31:01)Ssh2ChannelSession/SSHVMSCHSESSION.C;13:2105:
destroying session channel
debug[00000DD9]: (19:31:01)Ssh2Common/SSHCOMMON.C;1:859: num_channels now
0
debug[00000DD9]: ssh_pty_stream_destroy 00581D60
debug[00000DD9]: (19:31:01)SshUnixPtyStream/SSHVMSPTYSTREAM.C;1:537: Mark
process 00000DDA for death
debug[00000DD9]: (19:31:01)Pty-VMS/PTY-VMS.C;3:586: vms_pty_write_eof -
channel 320 buff 5971968
debug[00000DD9]: (19:31:02)SshEventLoop/SSHSUBSYSTEMELOOP.C;1:364:
Destroying structure for pipe 4
debug[00000DD9]: (19:31:02)Ssh2Common/SSHCOMMON.C;1:196: DISCONNECT
received: Connection closed.
debug[00000DD9]: (19:31:02)Sshd2/SSHD2.C;2:218: locally_generated = TRUE
debug[00000DD9]: (19:31:02)SshServer/SSHSERVER.C;1:229: Destroying
server.
debug[00000DD9]: (19:31:02)SshConfig/SSHCONFIG.C;1:673: Freeing pki.
(host_pki != NULL, user_pki != NULL)
debug[00000DD9]: (19:31:02)SshCertCMi/CMI.C;1:2685: Free certificate
manager.
debug[00000DD9]: (19:31:02)SshCertDB/CERT-DB.C;1:669: free'ing cert-db
debug[00000DD9]: (19:31:02)SshCertDB/CERT-DB.C;1:712: memory left 0
debug[00000DD9]: (19:31:02)SshCertEdb/CMI-EDB.C;1:51: Freeing local and
external database information.
debug[00000DD9]: (19:31:02)SshCertCMi/CMI.C;1:2332: Free configuration.
debug[00000DD9]: (19:31:02)SshCertCMi/CMI.C;1:2685: Free certificate
manager.
debug[00000DD9]: (19:31:02)SshCertDB/CERT-DB.C;1:669: free'ing cert-db
debug[00000DD9]: (19:31:02)SshCertDB/CERT-DB.C;1:712: memory left 0
debug[00000DD9]: (19:31:02)SshCertEdb/CMI-EDB.C;1:51: Freeing local and
external database information.
debug[00000DD9]: (19:31:02)SshCertCMi/CMI.C;1:2332: Free configuration.
debug[00000DD9]: (19:31:02)SshConnection/SSHCONN.C;1:1982: Destroying
SshConn object.
debug[00000DD9]: (19:31:02)Ssh2AuthPubKeyServer/AUTHS-PUBKEY.C;1:1254:
auth_pubkey op = 3 user = bunkermaxwel
debug[00000DD9]: (19:31:02)Ssh2AuthPasswdServer/AUTHS-PASSWD.C;3:570:
password auth.
debug[00000DD9]: (19:31:02)Ssh2AuthPasswdServer/AUTHS-PASSWD.C;3:572: op = 3
user = bunkermaxwel
debug[00000DD9]: (19:31:02)Ssh2AuthHostBasedServer/AUTHS-HOSTBASED.C;1:446:
auth_hostbased op = 3 user = bunkermaxwel
debug[00000DD9]: (19:31:02)SshAuthMethodServer/SSHAUTHMETHODS.C;1:76:
Calling notification callback.
debug[00000DD9]: (19:31:02)SshServer/SSHSERVER.C;1:258: Destroying server
completed.
debug[00000DD9]: (19:31:02)SshAuthMethodServer/SSHAUTHMETHODS.C;1:76:
Destroying authentication method array.
debug[00000DD9]: (19:31:02)Ssh2Transport/TRCOMMON.C;2:3837: Destroying
transport stream.
debug[00000DD9]: (19:31:02)Ssh2Transport/TRCOMMON.C;2:572: Destroying
SshTransportCommon object.
debug[00000DD9]: (19:31:02)Ssh2Transport/TRCOMMON.C;2:526: Cleaning up after
a key exchange.
debug[00000DD9]: (19:31:02)SshAppCommon/SSHAPPCOMMON.C;1:149: Freeing global
SshRegex context.
debug[00000DD9]: (19:31:02)SshADTList/SSHADT_LIST.C;1:386: Detach:
handle=561178
debug[00000DD9]: (19:31:02)SshADTList/SSHADT_LIST.C;1:386: Detach:
handle=56120c
debug[00000DD9]: (19:31:02)SshADTList/SSHADT_LIST.C;1:386: Detach:
handle=56115c
debug[00000DD9]: (19:31:02)SshADTList/SSHADT_LIST.C;1:386: Detach:
handle=56ff24
debug[00000DD9]: (19:31:02)SshADTList/SSHADT_LIST.C;1:386: Detach:
handle=56ff64
debug[00000DD9]: (19:31:02)SshADTList/SSHADT_LIST.C;1:386: Detach:
handle=56ffa4
debug[00000DD9]: (19:31:02)SshADTList/SSHADT_LIST.C;1:386: Detach:
handle=56ffc4
debug[00000DD9]: (19:31:02)SshADTList/SSHADT_LIST.C;1:386: Detach:
handle=570004
debug[00000DD9]: (19:31:02)SshADTMap/SSHADT_MAP.C;1:406: Detach:
handle=561134
debug[00000DD9]: (19:31:02)SshADTMap/SSHADT_MAP.C;1:406: Detach:
handle=5610cc
debug[00000DD9]: (19:31:02)SshConfig/SSHCONFIG.C;1:673: Freeing pki.
(host_pki = NULL, user_pki = NULL)


I would appreciate any help with this.

Thanks.

Jess

Jessie Bunker-Maxwell
Network Access Services
Santa Cruz Public Library
224 Church St.
Santa Cruz, CA 95060
Phone: 831-420-5764
Fax: 831-459-7936
Email: jessb@santacruzpl.org