From owner-freebsd-questions@FreeBSD.ORG Mon Aug 9 00:15:13 2004 Return-Path: Delivered-To: freebsd-questions@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id 4EC1216A4CE for ; Mon, 9 Aug 2004 00:15:13 +0000 (GMT) Received: from Libby.westnet.com (Libby.westnet.com [206.24.6.30]) by mx1.FreeBSD.org (Postfix) with ESMTP id C59A643D2F for ; Mon, 9 Aug 2004 00:15:12 +0000 (GMT) (envelope-from Brian.Driscoll@hrst.net) Received: from hrst.net (driscoll.dsl.westnet.com [206.99.59.64]) by Libby.westnet.com (8.12.11/8.12.11) with ESMTP id i790F8P0021320 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Sun, 8 Aug 2004 20:15:09 -0400 (EDT) X-EL-Whitelist: sent via whitelisted host driscoll.dsl.westnet.com:206.99.59.64 Message-ID: <4116C1E6.3010107@hrst.net> Date: Sun, 08 Aug 2004 20:14:30 -0400 From: Brian Driscoll User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.0; en-US; rv:1.4) Gecko/20030624 Netscape/7.1 (ax) X-Accept-Language: en-us, en MIME-Version: 1.0 To: freebsd-questions@freebsd.org Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit X-Virus-Scanned: clamd / ClamAV version 0.75.1, clamav-milter version 0.75c on Libby X-Virus-Status: Clean Subject: backup via dump to remote machine(5.2.1) X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 09 Aug 2004 00:15:13 -0000 Not sure if you've got an answer on this yet ... but better late than never ... as I just had to figure this out today. This answer applies if you executing your dump command as root. dumping to a remote tape drive involves using rmt. rmt is executed via rsh on the remote. By default many systems don't allow root access via rsh out of the box. On Red Hat Linux you can enable it by adding the line "rsh" (without the quotes) to /etc/securetty. This file contains the "devices" that root is allowed to logon. Note enabling root access via rsh could open a security hole on your machine unless its well protected. So understand the ramifications of this change before applying it.