xref: /openbsd/usr.bin/rdist/rdist.1 (revision 274d7c50)
1.\"	$OpenBSD: rdist.1,v 1.49 2017/01/01 01:08:11 tb Exp $
2.\"
3.\" Copyright (c) 1983 Regents of the University of California.
4.\" All rights reserved.
5.\"
6.\" Redistribution and use in source and binary forms, with or without
7.\" modification, are permitted provided that the following conditions
8.\" are met:
9.\" 1. Redistributions of source code must retain the above copyright
10.\"    notice, this list of conditions and the following disclaimer.
11.\" 2. Redistributions in binary form must reproduce the above copyright
12.\"    notice, this list of conditions and the following disclaimer in the
13.\"    documentation and/or other materials provided with the distribution.
14.\" 3. Neither the name of the University nor the names of its contributors
15.\"    may be used to endorse or promote products derived from this software
16.\"    without specific prior written permission.
17.\"
18.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
19.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
20.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
21.\" ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
22.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
23.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
24.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
25.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
26.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
27.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
28.\" SUCH DAMAGE.
29.\"
30.\"	$From: rdist.man,v 6.34 1996/01/29 22:37:19 mcooper Exp $
31.\"	@(#)rdist.1	6.6 (Berkeley) 5/13/86
32.\"
33.Dd $Mdocdate: January 1 2017 $
34.Dt RDIST 1
35.Os
36.Sh NAME
37.Nm rdist
38.Nd remote file distribution client program
39.Sh SYNOPSIS
40.Nm rdist
41.Bk -words
42.Op Fl DFnV
43.Op Fl A Ar num
44.Op Fl a Ar num
45.Op Fl c Ar mini_distfile
46.Op Fl d Ar var Ns = Ns Ar value
47.Op Fl f Ar distfile
48.Op Fl L Ar remote_logopts
49.Op Fl l Ar local_logopts
50.Op Fl M Ar maxproc
51.Op Fl m Ar host
52.Op Fl o Ar distopts
53.Op Fl P Ar rsh-path
54.Op Fl p Ar rdistd-path
55.Op Fl t Ar timeout
56.Op Ar name ...
57.Ek
58.Sh DESCRIPTION
59.Nm
60is a program to maintain identical copies of files over multiple hosts.
61It preserves the owner, group, mode, and mtime of files if possible and
62can update programs that are executing.
63.Pp
64.Nm
65reads commands from
66.Pa distfile
67to direct the updating of files and/or directories.
68If
69.Pa distfile
70is
71.Sq - ,
72the standard input is used.
73If no
74.Fl f
75option is present, the program looks first for
76.Pa distfile ,
77then
78.Pa Distfile ,
79to use as the input.
80If no names are specified on the command line,
81.Nm
82will update all of the files and directories listed in
83.Pa distfile .
84If the file
85.Pa /etc/Distfile
86exists,
87it will be run automatically by the clock daemon
88.Xr cron 8 ,
89via the system script
90.Xr daily 8 .
91.Pp
92If
93.Ar name
94is specified,
95it is taken to be the name of a file to be updated
96or the label of a command to execute.
97If label and file names conflict, it is assumed to be a label.
98These may be used together to update specific files using specific commands.
99.Pp
100.Nm
101uses a remote shell command to access each target host.
102By default,
103.Xr ssh 1
104is used unless overridden by the
105.Fl P
106option or the
107.Ev RSH
108environment variable.
109If the target host is the string
110.Dq localhost
111and the remote user name is the same as the local user name,
112.Nm
113will run the command:
114.Bd -literal -offset indent
115/bin/sh -c rdistd -S
116.Ed
117.Pp
118Otherwise,
119.Nm
120will run the command:
121.Bd -literal -offset indent
122ssh \*(Lthost\*(Gt -l \*(Ltlogin_name\*(Gt rdistd -S
123.Ed
124.Pp
125.Ar host
126is the name of the target host;
127.Ar login_name
128is the name of the user to make the connection as.
129.Pp
130On each target host
131.Nm
132will attempt to run the command:
133.Bd -literal -offset indent
134rdistd -S
135.Ed
136.Pp
137Or if the
138.Fl p
139option was specified,
140.Nm
141will attempt to run the command:
142.Bd -literal -offset indent
143\*(Ltrdistd path\*(Gt -S
144.Ed
145.Pp
146If no
147.Fl p
148option is specified, or
149.Aq Ar rdistd path
150is a simple filename,
151.Xr rdistd 1
152or
153.Aq Ar rdistd path
154must be somewhere in the
155.Ev PATH
156of the user running
157.Nm
158on the remote (target) host.
159.Pp
160The options are as follows:
161.Bl -tag -width Ds
162.It Fl A Ar num
163Set the minimum number of free files (inodes) on a filesystem that must exist
164for
165.Nm
166to update or install a file.
167.It Fl a Ar num
168Set the minimum amount of free space (in bytes) on a filesystem that must exist
169for
170.Nm
171to update or install a file.
172.It Fl c Ar mini_distfile
173Forces
174.Nm
175to interpret the remaining arguments as a small distfile.
176The format is:
177.Bd -literal -offset indent
178$ rdist -c name ... [login@]host[:dest]
179.Ed
180.Pp
181The equivalent distfile is as follows:
182.Bd -literal -offset indent
183(  name ... ) -\*(Gt [login@]host
184	install	[dest] ;
185.Ed
186.It Fl D
187Enable copious debugging messages.
188.It Xo
189.Fl d Ar var Ns = Ns Ar value
190.Xc
191Define
192.Ar var
193to have
194.Ar value .
195This
196option is used to define or override variable definitions in
197.Pa distfile .
198.Ar value
199can be the empty string, one name, or a list of names surrounded by
200parentheses and separated by tabs and/or spaces.
201.It Fl F
202Do not fork any child
203.Nm
204processes.
205All clients are updated sequentially.
206.It Fl f Ar distfile
207Set the name of the distfile to
208.Ar distfile .
209If
210.Sq -
211(dash) is used then read from standard input (stdin).
212.It Fl L Ar remote_logopts
213Set remote logging options.
214See the section
215.Sx MESSAGE LOGGING
216for details on the syntax for
217.Ar remote_logopts .
218.It Fl l Ar local_logopts
219Set local logging options.
220See the section
221.Sx MESSAGE LOGGING
222for details on the syntax for
223.Ar local_logopts .
224.It Fl M Ar maxproc
225Set the maximum number of simultaneously running child
226.Nm
227processes to
228.Ar maxproc .
229The default is 4.
230.It Fl m Ar host
231Limit which machines are to be updated.
232Multiple
233.Fl m
234arguments can be given to limit updates to a subset of the hosts listed in
235.Pa distfile .
236.It Fl n
237Print the commands without executing them.
238This option is useful for debugging a distfile.
239.It Fl o Ar distopts
240Specify the dist options to enable.
241.Ar distopts
242is a comma separated list of options which are listed below.
243The valid values for
244.Ar distopts
245are:
246.Bl -tag -width Ds
247.It Ic chknfs
248Do not check or update files on the target host
249that reside on NFS filesystems.
250.It Ic chkreadonly
251Enable a check on the target host
252to see if a file resides on a read-only filesystem.
253If a file does, then no checking or updating of the file is attempted.
254.It Ic chksym
255If the target on the remote host is a symbolic link, but is not on the
256master host, the remote target will be left a symbolic link.
257This behavior is generally considered a bug in the original version of
258.Nm rdist ,
259but is present to allow compatibility with older versions.
260.It Ic compare
261Binary comparison.
262Perform a binary comparison and update files if they differ rather than
263comparing dates and sizes.
264.It Ic defgroup Ns Op = Ns Ar groupname
265If the group of a file to be transferred does not exist on the destination
266host, use the specified group instead.
267If
268.Ar groupname
269is not specified, the
270.Em bin
271group is used.
272.It Ic defowner Ns Op = Ns Ar owner
273If the owner of a file to be transferred does not exist on the destination
274host, use the specified owner instead.
275If
276.Ar owner
277is not specified, the user
278.Em bin
279is used.
280.It Ic follow
281Follow symbolic links.
282Copy the file that the link points to rather than the link itself.
283.It Ic history
284When
285.Ic savetargets
286and
287.Ic history
288are both defined then the target file that is updated is first renamed from
289.Pa file
290to
291.Pa file.NNN
292where NNN increases for each generation update.
293The first generation is 001, and the last is 999.
294After 999 generations, the counter is reset and stuck to 001,
295and 001 will get overwritten all the time.
296This is undesirable behavior, so some other method needs to be devised
297to clean up or limit the number of generations.
298.It Ic ignlnks
299Ignore unresolved links.
300.Nm
301will normally try to maintain the link structure of files being transferred
302and warn the user if all the links cannot be found.
303.It Ic nochkgroup
304Do not check group ownership of files that already exist.
305The file ownership is only set when the file is updated.
306.It Ic nochkmode
307Do not check file and directory permission modes.
308The permission mode is only set when the file is updated.
309.It Ic nochkowner
310Do not check user ownership of files that already exist.
311The file ownership is only set when the file is updated.
312.It Ic nodescend
313Do not descend into a directory.
314Normally,
315.Nm
316will recursively check directories.
317If this option is enabled, then any files listed in the file list in the
318distfile that are directories are not recursively scanned.
319Only the existence, ownership, and mode of the directory are checked.
320.It Ic noexec
321Automatically exclude executable binary files in
322.Xr elf 5
323format from being checked or updated.
324.It Ic numchkgroup
325Use the numeric group ID (GID) to check group ownership instead of
326the group name.
327.It Ic numchkowner
328Use the numeric user ID (UID) to check user ownership instead of
329the user name.
330.It Ic quiet
331Quiet mode.
332Files that are being modified are normally printed on standard output.
333This option suppresses that.
334.It Ic remove
335Remove extraneous files.
336If a directory is being updated, any files that exist on the remote host
337that do not exist in the master directory are removed.
338This is useful for maintaining truly identical copies of directories.
339.It Ic savetargets
340Save files that are updated instead of removing them.
341Any target file that is updated is first renamed from
342.Pa file
343to
344.Pa file.OLD .
345.It Ic sparse
346Enable checking for sparse files.
347One of the most common types of sparse files are those produced by
348.Xr dbopen 3 .
349This option adds some additional processing overhead so it should
350only be enabled for targets likely to contain sparse files.
351.It Ic updateperm
352Do not send the whole file when the size and the modification time match.
353Instead, just update the ownership, group, and permissions as necessary.
354.It Ic verify
355Verify that the files are up to date on all the hosts.
356Any files that are out of date will be displayed
357but no files will be changed and no mail will be sent.
358.It Ic whole
359Whole mode.
360The whole file name is appended to the destination directory name.
361Normally, only the last component of a name is used when renaming files.
362This will preserve the directory structure of the files being
363copied instead of flattening the directory structure.
364For example, rdisting a list of files such as
365.Pa /p/dir1/f1
366and
367.Pa /p/dir2/f2
368to
369.Pa /tmp/dir
370would create files
371.Pa /tmp/dir/p/dir1/f1
372and
373.Pa /tmp/dir/p/dir2/f2
374instead of
375.Pa /tmp/dir/dir1/f1
376and
377.Pa /tmp/dir/dir2/f2 .
378.It Ic younger
379Younger mode.
380Files are normally updated if their
381.Em mtime
382and
383.Em size
384(see
385.Xr stat 2 )
386disagree.
387This option causes
388.Nm
389not to update files that are younger than the master copy.
390This can be used to prevent newer copies on other hosts from being replaced.
391A warning message is printed for files which are newer than the master copy.
392.El
393.It Fl P Ar rsh-path
394Set the path to the remote shell command.
395.Ar rsh-path
396may be a colon separated list of possible pathnames,
397in which case the first component of the path to exist is used.
398.It Fl p Ar rdistd-path
399Set the path where the rdistd server is searched for on the target host.
400.It Fl t Ar timeout
401Set the timeout period,
402in seconds,
403for waiting for responses from the remote
404.Nm
405server.
406The default is 900 seconds.
407.It Fl V
408Print version information and exit.
409.El
410.Sh DISTFILES
411The
412.Pa distfile
413contains a sequence of entries that specify the files
414to be copied, the destination hosts, and what operations to perform
415to do the updating.
416Each entry has one of the following formats.
417.Bd -literal -offset indent
418\*(Ltvariable name\*(Gt = \*(Ltname list\*(Gt
419[ label: ] \*(Ltsource list\*(Gt -\*(Gt \*(Ltdestination list\*(Gt \*(Ltcommand list\*(Gt
420[ label: ] \*(Ltsource list\*(Gt :: \*(Lttimestamp file\*(Gt \*(Ltcommand list\*(Gt
421.Ed
422.Pp
423The first format is used for defining variables.
424The second format is used for distributing files to other hosts.
425The third format is used for making lists of files that have been changed
426since some given date.
427The
428.Ar source list
429specifies a list of files and/or directories on the local host which are to
430be used as the master copy for distribution.
431The
432.Ar destination list
433is the list of hosts to which these files are to be copied.
434Each file in the source list is added to a list of changes if the file
435is out of date on the host which is being updated (second format) or
436the file is newer than the
437.Ar timestamp file
438(third format).
439.Pp
440Newlines, tabs, and blanks are only used as separators and are
441otherwise ignored.
442Comments begin with
443.Sq #
444and end with a newline.
445.Pp
446Variables to be expanded begin with
447.Sq $
448followed by one character or a name enclosed in curly braces
449(see the examples at the end).
450.Pp
451Labels are optional.
452They are used to identify a specific command to execute
453(for example, allowing an update of a subset of a repository).
454.Pp
455The source and destination lists have the following format:
456.Bd -literal -offset indent
457\*(Ltname\*(Gt
458.Ed
459or
460.Bd -literal -compact -offset indent
461`(' \*(Ltzero or more names separated by whitespace\*(Gt `)'
462.Ed
463.Pp
464These simple lists can be modified by using one level of set addition,
465subtraction, or intersection like this:
466.Pp
467.Dl list - list
468or
469.Dl list + list
470or
471.Dl list & list
472.Pp
473If additional modifications are needed (e.g.\&
474.Do
475all servers and client machines except for the OSF/1 machines
476.Dc )
477then the list will have to be explicitly constructed in steps using
478.Dq temporary
479variables.
480.Pp
481The shell meta-characters `[', `]', `{', `}', `*', and `?'
482are recognized and expanded (on the local host only) in the same way as
483.Xr ksh 1 .
484They can be escaped with a backslash.
485The `~' character is also expanded in the same way as
486.Xr ksh 1
487but is expanded separately on the local and destination hosts.
488When the
489.Fl o Ar whole
490option is used with a file name that begins with `~', everything except the
491home directory is appended to the destination name.
492File names which do not begin with `/' or `~' use the destination user's
493home directory as the root directory for the rest of the file name.
494.Pp
495The command list consists of zero or more commands of the following
496format:
497.Bl -column "except_pat" "<pattern list>" "opt_dest_name" ";" -offset indent
498.It install Ta \*(Ltoptions\*(Gt Ta opt_dest_name Ta ;
499.It notify Ta \*(Ltname list\*(Gt Ta "" Ta ;
500.It except Ta \*(Ltname list\*(Gt Ta "" Ta ;
501.It except_pat Ta \*(Ltpattern list\*(Gt Ta "" Ta ;
502.It special Ta \*(Ltname list\*(Gt Ta string Ta ;
503.It cmdspecial Ta \*(Ltname list\*(Gt Ta string Ta ;
504.El
505.Pp
506The
507.Cm install
508command is used to copy out-of-date files and/or directories.
509Each source file is copied to each host in the destination list.
510Directories are recursively copied in the same way.
511.Ar opt_dest_name
512is an optional parameter to rename files.
513If no
514.Cm install
515command appears in the command list or the destination name is not specified,
516the source file name is used.
517Directories in the path name will be created if they
518do not exist on the remote host.
519The
520.Fl o Ar distopts
521option as specified above has the same semantics as
522on the command line except
523.Ar distopts
524only applies to the files in the source list.
525The login name used on the destination host is the same as the local host
526unless the destination name is of the format
527.Dq login@host .
528.Pp
529The
530.Cm notify
531command is used to mail the list of files updated (and any errors
532that may have occurred) to the listed names.
533If no `@' appears in the name, the destination host is appended to
534the name
535(e.g. name1@host, name2@host, ...).
536.Pp
537The
538.Cm except
539command is used to update all of the files in the source list
540.Sy except
541for the files listed in
542.Ar name list .
543This is usually used to copy everything in a directory except certain files.
544.Pp
545The
546.Cm except_pat
547command is like the
548.Cm except
549command except that
550.Ar pattern list
551is a list of basic regular expressions
552(see
553.Xr re_format 7
554for details).
555If one of the patterns matches some string within a file name, that file will
556be ignored.
557Note that since `\e' is a quote character, it must be doubled to become
558part of the regular expression.
559Variables are expanded in
560.Ar pattern list
561but not shell file pattern matching characters.
562To include a `$', it must be escaped with `\e'.
563.Pp
564The
565.Cm special
566command is used to specify
567.Xr sh 1
568commands that are to be executed on the remote host after the file in
569.Ar name list
570is updated or installed.
571If the
572.Ar name list
573is omitted then the shell commands will be executed for every file
574updated or installed.
575.Ar string
576starts and ends with `"' and can cross multiple lines in
577.Pa distfile .
578Multiple commands to the shell should be separated by `;'.
579Commands are executed in the user's home directory on the host
580being updated.
581The
582.Cm special
583command can be used, for example, to rebuild private databases
584after a program has been updated.
585The following environment variables are set for each
586.Cm special
587command:
588.Pp
589.Bl -tag -width "BASEFILE" -offset 3n -compact
590.It Ev FILE
591The full pathname of the local file that was just updated.
592.It Ev REMFILE
593The full pathname of the remote file that was just updated.
594.It BASEFILE
595The basename of the remote file that was just updated.
596.El
597.Pp
598The
599.Cm cmdspecial
600command is similar to the
601.Cm special
602command, except it is executed only when the entire command is completed
603instead of after each file is updated.
604The list of files is placed in the
605.Ev FILES
606environment variable.
607Each file name in
608.Ev FILES
609is separated by a
610.Sq :\&
611(colon).
612.Pp
613If a hostname ends in a
614.Sq +
615(plus sign),
616then the plus
617is stripped off and NFS checks are disabled.
618This is equivalent to disabling the
619.Fl o Ar chknfs
620option just for this one host.
621.Sh MESSAGE LOGGING
622.Nm
623uses a collection of predefined message
624.Em facilities
625that each contain a list of message
626.Em types
627specifying which types of messages to send to that facility.
628The local client
629and the remote server
630each maintain their own copy
631of what types of messages to log to what facilities.
632.Pp
633The
634.Fl l
635.Ar local_logopts
636option specifies the logging options to use locally;
637.Fl L
638.Ar remote_logopts
639specifies the logging options to pass to the remote server.
640.Pp
641Logging options should be of the form:
642.Pp
643.D1 facility=types:facility=types...
644.Pp
645The valid facility names are:
646.Bl -tag -width Ds -offset indent
647.It Ic file
648Log to a file.
649To specify the file name, use the format
650.Dq file=filename=types .
651For example:
652.Pp
653.Dl file=/tmp/rdist.log=all,debug
654.It Ic notify
655Use the internal
656.Nm
657.Ic notify
658facility.
659This facility is used in conjunction with the
660.Ic notify
661keyword in a
662.Pa distfile
663to specify what messages are mailed to the
664.Ic notify
665address.
666.It Ic stdout
667Messages to standard output.
668.It Ic syslog
669Use the
670.Xr syslogd 8
671facility.
672.El
673.Pp
674.Ar types
675should be a comma separated list of message types.
676Each message type specified enables that message level.
677This is unlike the
678.Xr syslog 3
679system facility which uses an ascending order scheme.
680The following are the valid types:
681.Bl -tag -width Ds -offset indent
682.It Ic all
683All but debug messages.
684.It Ic change
685Things that change.
686This includes files that are installed or updated in some way.
687.It Ic debug
688Debugging information.
689.It Ic ferror
690Fatal errors.
691.It Ic info
692General information.
693.It Ic nerror
694Normal errors that are not fatal.
695.It Ic notice
696General info about things that change.
697This includes things like making directories which are needed in order
698to install a specific target, but which are not explicitly specified in the
699.Pa distfile .
700.It Ic warning
701Warnings about errors which are not as serious as
702.Ic nerror
703type messages.
704.El
705.Pp
706Here is a sample command line option:
707.Bd -literal -offset indent
708-l stdout=all:syslog=change,notice:file=/tmp/rdist.log=all
709.Ed
710.Pp
711This entry will set local message logging to have all but debug
712messages sent to standard output, change and notice messages will
713be sent to
714.Xr syslog 3 ,
715and all messages will be written to the file
716.Pa /tmp/rdist.log .
717.Sh ENVIRONMENT
718.Bl -tag -width "TMPDIR"
719.It RSH
720Name of the default remote shell program to use.
721The default is
722.Xr ssh 1 .
723.It TMPDIR
724Name of the temporary directory to use.
725The default is
726.Pa /tmp .
727.El
728.Sh FILES
729.Bl -tag -width "$TMPDIR/rdist*XXX" -compact
730.It Pa {d,D}istfile
731.Nm
732command file.
733.It Pa /etc/Distfile
734System-wide
735.Nm
736command file.
737.It Pa $TMPDIR/rdist*
738Temporary file for update lists.
739.El
740.Sh EXAMPLES
741The following is an example
742.Pa distfile :
743.Bd -literal -offset indent
744HOSTS = ( matisse root@arpa)
745
746FILES = ( /bin /lib /usr/bin /usr/games
747	/usr/include/{*.h,{stand,sys,vax*,pascal,machine}/*.h}
748	/usr/lib /usr/man/man? /usr/ucb /usr/local/rdist )
749
750EXLIB = ( Mail.rc aliases aliases.db crontab dshrc
751	sendmail.cf sendmail.hf sendmail.st uucp vfont )
752
753${FILES} -\*(Gt ${HOSTS}
754	install -oremove,chknfs ;
755	except /usr/lib/${EXLIB} ;
756	except /usr/games/lib ;
757	special /usr/lib/sendmail "/usr/lib/sendmail -bi" ;
758
759srcs:
760/usr/src/bin -\*(Gt arpa
761	except_pat ( \e\e.o\e$ /SCCS\e$ ) ;
762
763IMAGEN = (ips dviimp catdvi)
764
765imagen:
766/usr/local/${IMAGEN} -\*(Gt arpa
767	install /usr/local/lib ;
768	notify ralph ;
769
770sendmail.cf :: stamp.cory
771	notify root@cory ;
772.Ed
773.Pp
774Using the above
775.Pa distfile :
776.Pp
777Update everything that's out of date,
778making any relevant notifications:
779.Pp
780.Dl $ rdist
781.Pp
782Update files in
783.Pa /usr/src/bin
784to host
785.Dq arpa ,
786except for files with names ending
787.Dq .o
788or
789.Dq /SCCS :
790.Pp
791.Dl $ rdist srcs
792.Pp
793Update
794.Pa sendmail.cf
795if it's older than timestamp file
796.Pa stamp.cory ,
797notifying root@cory if an update has happened:
798.Pp
799.Dl $ rdist sendmail.cf
800.Sh SEE ALSO
801.Xr rdistd 1 ,
802.Xr sh 1 ,
803.Xr ssh 1 ,
804.Xr re_format 7 ,
805.Xr daily 8 ,
806.Xr syslogd 8
807.Sh STANDARDS
808The options
809.Op Fl bhiNOqRrsvwxy
810are still recognized for backwards compatibility.
811.Sh CAVEATS
812If the basename of a file
813(the last component in the pathname)
814is
815.Sq .\& ,
816.Nm
817assumes the remote (destination) name is a directory.
818That is,
819.Pa /tmp/.\&
820means that
821.Pa /tmp
822should be a directory on the remote host.
823.Sh BUGS
824Source files must reside on the local host where
825.Nm
826is executed.
827.Pp
828Variable expansion only works for name lists;
829there should be a general macro facility.
830.Pp
831.Nm
832aborts on files which have a negative mtime (before Jan 1, 1970).
833.Pp
834If a hardlinked file is listed more than once in the same target,
835.Nm
836will report missing links.
837Only one instance of a link should be listed in each target.
838.Pp
839The
840.Ic defowner ,
841.Ic defgroup ,
842and
843.Ic updateperm
844options are extensions to the 6.1.0 protocol and will not work with earlier
845versions of rdist 6.
846