#1
|
|||
|
|||
SCP Error The arguments to the scp command are invalid
I am trying to scp from a Solaris 10 server running openssh 5.5p1 to window server with Vshell 3.6 installed. I receive this error message " The arguments to the scp command are invalid". However if I send a file from a solaris 10 server running openssl 4.4p1 to the same window server the file is successfully transferred. Can you tell me is there are any incompatibilities between Vshell 3.6 and openssh 5.5p1? In the below example of the failure you will see " Sending command: scp -v -p -t -- /ng-virssw01-external/DSSResourceMetrics/surya6.sa11 " the "--" seem to be the issue.
pkginfo -l openssh PKGINST: openssh NAME: openssh CATEGORY: local ARCH: sparc VERSION: 5.5p1 VENDOR: The OpenSSH Group PSTAMP: openssh.20100723.ljh INSTDATE: Aug 12 2010 22:06 STATUS: completely installed FILES: 37 installed pathnames 8 shared pathnames 11 directories 10 executables 1 setuid/setgid executables 3750 blocks used (approx) $ telnet 10.193.11.27 22 Trying 10.193.11.27... Connected to 10.193.11.27. Escape character is '^]'. SSH-2.0-VShell_3_6_0_380 VShell ^] telnet> quit Connection to 10.193.11.27 closed. scp -vp /var/adm/sa/sa11 userid@10.193.11.27:"/ng-virssw01-external/DSSResourceMetrics/`uname -n`.sa11" Executing: program /usr/local/bin/ssh host 10.193.11.27, user userid, command scp -v -p -t -- /ng-virssw01-external/DSSResourceMetrics/surya6.sa11 OpenSSH_5.5p1, OpenSSL 0.9.8o 01 Jun 2010 debug1: Reading configuration data /usr/local/etc/ssh_config debug1: Applying options for * debug1: Connecting to 10.193.11.27 [10.193.11.27] port 22. debug1: Connection established. debug1: identity file /export/home/kange/.ssh/id_rsa type -1 debug1: identity file /export/home/kange/.ssh/id_rsa-cert type -1 debug1: identity file /export/home/kange/.ssh/id_dsa type -1 debug1: identity file /export/home/kange/.ssh/id_dsa-cert type -1 debug1: Remote protocol version 2.0, remote software version VShell_3_6_0_380 VShell debug1: no match: VShell_3_6_0_380 VShell debug1: Enabling compatibility mode for protocol 2.0 debug1: Local version string SSH-2.0-OpenSSH_5.5 debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: kex: server->client aes128-ctr hmac-md5 none debug1: kex: client->server aes128-ctr hmac-md5 none debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP debug1: SSH2_MSG_KEX_DH_GEX_INIT sent debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY debug1: Host '10.193.11.27' is known and matches the DSA host key. debug1: Found key in /export/home/kange/.ssh/known_hosts:4 debug1: ssh_dss_verify: signature correct debug1: SSH2_MSG_NEWKEYS sent debug1: expecting SSH2_MSG_NEWKEYS debug1: SSH2_MSG_NEWKEYS received debug1: Roaming not allowed by server debug1: SSH2_MSG_SERVICE_REQUEST sent debug1: SSH2_MSG_SERVICE_ACCEPT received Notice and Warning This computer system is the property of the Commonwealth of Virginia and is intended for authorized users only. By accessing and using this system you are consenting to system monitoring for law enforcement and other purposes. Unauthorized use of this computer system may subject you to State or Federal criminal prosecution and penalties.debug1: Authentications that can continue: publickey,password,gssapi-with-mic debug1: Next authentication method: publickey debug1: Trying private key: /export/home/kange/.ssh/id_rsa debug1: Trying private key: /export/home/kange/.ssh/id_dsa debug1: read PEM private key done: type DSA debug1: Authentication succeeded (publickey). debug1: channel 0: new [client-session] debug1: Entering interactive session. debug1: Sending command: scp -v -p -t -- /ng-virssw01-external/DSSResourceMetrics/surya6.sa11 scp: 03707: The arguments to the scp command are invalid debug1: channel 0: free: client-session, nchannels 1 debug1: fd 0 clearing O_NONBLOCK debug1: fd 1 clearing O_NONBLOCK Transferred: sent 1912, received 2112 bytes, in 0.0 seconds Bytes per second: sent 72064.1, received 79602.2 debug1: Exit status -1 scp -vp /export/home/kange/surya5.sa11.txt yyvirssw01_sftpwr@10.193.11.27:/ng-v...urya5.sa11.txt Executing: program /usr/local/bin/ssh host 10.193.11.27, user userid, command scp -v -p -t /ng-virssw01-external/DSSResourceMetrics/surya5.sa11.txt OpenSSH_4.4p1, OpenSSL 0.9.8r 8 Feb 2011 debug1: Connecting to 10.193.11.27 [10.193.11.27] port 22. debug1: Connection established. debug1: identity file /export/home/kange/.ssh/identity type -1 debug1: identity file /export/home/kange/.ssh/id_rsa type -1 debug1: identity file /export/home/kange/.ssh/id_dsa type 2 debug1: Remote protocol version 2.0, remote software version VShell_3_6_0_380 VShell debug1: no match: VShell_3_6_0_380 VShell debug1: Enabling compatibility mode for protocol 2.0 debug1: Local version string SSH-2.0-OpenSSH_4.4 debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: kex: server->client aes128-cbc hmac-md5 none debug1: kex: client->server aes128-cbc hmac-md5 none debug1: SSH2_MSG_KEX_DH_GEX_REQUEST(1024<1024<8192) sent debug1: expecting SSH2_MSG_KEX_DH_GEX_GROUP debug1: SSH2_MSG_KEX_DH_GEX_INIT sent debug1: expecting SSH2_MSG_KEX_DH_GEX_REPLY debug1: Host '10.193.11.27' is known and matches the DSA host key. debug1: Found key in /export/home/kange/.ssh/known_hosts:5 debug1: ssh_dss_verify: signature correct debug1: SSH2_MSG_NEWKEYS sent debug1: expecting SSH2_MSG_NEWKEYS debug1: SSH2_MSG_NEWKEYS received debug1: SSH2_MSG_SERVICE_REQUEST sent debug1: SSH2_MSG_SERVICE_ACCEPT received Notice and Warning This computer system is the property of the Commonwealth of Virginia and is intended for authorized users only. By accessing and using this system you are consenting to system monitoring for law enforcement and other purposes. Unauthorized use of this computer system may subject you to State or Federal criminal prosecution and penalties.debug1: Authentications that can continue: publickey,password,gssapi-with-mic debug1: Next authentication method: publickey debug1: Trying private key: /export/home/kange/.ssh/identity debug1: Trying private key: /export/home/kange/.ssh/id_rsa debug1: Offering public key: /export/home/kange/.ssh/id_dsa debug1: Server accepts key: pkalg ssh-dss blen 433 debug1: read PEM private key done: type DSA debug1: Authentication succeeded (publickey). debug1: channel 0: new [client-session] debug1: Entering interactive session. debug1: Sending command: scp -v -p -t /ng-virssw01-external/DSSResourceMetrics/surya5.sa11.txt Sending file modes: C0640 238440 surya5.sa11.txt surya5.sa11.txt 100% 233KB 232.9KB/s 00:00 debug1: client_input_channel_req: channel 0 rtype exit-status reply 0 debug1: channel 0: free: client-session, nchannels 1 debug1: fd 0 clearing O_NONBLOCK debug1: fd 1 clearing O_NONBLOCK debug1: Transferred: stdin 0, stdout 0, stderr 0 bytes in 5.3 seconds debug1: Bytes per second: stdin 0.0, stdout 0.0, stderr 0.0 debug1: Exit status 0 |
#2
|
|||
|
|||
Hi kathyange,
Thanks for the question. The issue is indeed with the new parameter that OpenSSH version 5.4 scp client (and newer) is sending. VShell 3.6.5 and newer can parse the new parameter. You can download VShell 3.6.6 from the following location: http://www.vandyke.com/download/vshell/3.6/index.htmlDoes upgrading to VShell 3.6.6 resolve the issue? |
![]() |
Tags |
invalid , scp |
Thread Tools | |
Display Modes | |
|
|