chip@chinacat.unicom.com (Chip Rosenthal) (06/05/91)
I have a pair of programs nearly complete to implement uucp over SCO/Lachman TCP/IP. The programs are `uucpd' and `uucpm' - daemons for the slave and master uucico network processes, respectively. `uucpd' is a port of the Berkeley uucp daemon. It has been tested under both XENIX (with TCP 1.0) and UNIX (with TCP 1.1). Yeah...it supports the Secureware nonsense. It also supports shadow password files (e.g. the login suite by John Haugh). This daemon is intended to be run under inetd, by an /etc/inetd.conf line similar to: uucp stream tcp nowait root /etc/local/uucpd uucpd The other half, `uucpm' is a daemon which is started at system boot time. For example, you would start it with a command something like: /etc/local/uucpm /dev/ptyp7 The above command would make the device `/dev/ttyp7' available for uucp transfers. To use it, you would need a /usr/lib/uucp/Devices entry such as: TCPIP ttyp7 - 19200 direct and a /usr/lib/uucp/Systems entry such as: coldsnap Any TCPIP Any - "" coldsnap gin: NAME word: PASSWORD ^^^^^^^^^^^ Note how the system name is passed to the tty in the chat script. The `uucpm' daemon receives this name and establishes the socket to the remote `uucpd'. These programs are very rough and largely untested - so I'd prefer to offer them to folks on a `beta-test' status. I'm hoping they will be cleaned up enough to distribute by the end of this weekend. If you'd be interested in receiving a copy when this stuff is ready, feel free to drop me a line. In your request, (1) please let me know what kind of system you plan to run these on, (2) what kind of system(s) you plan to connect to, and (3) indicate that you have obtained the crypt library. The crypt() call is available from SCO - but is not distributed with the system. You will need it in order to compile `uucpd'. -- Chip Rosenthal <chip@chinacat.Unicom.COM> | Don't play that Unicom Systems Development 512-482-8260 | loud, Mr. Collins.