cross-center file transfers
As with most ftp programs, MPSCP moves raw data over unsecured socket connections. End-user identification, authentication, and authorization, as well as control information (e.g., file names, the number of socket connections needed to move a particular file), are transmitted and encrypted by the underlying ssh connection.
The default tcp/ip port range used by MPSCP is 9000-9999. Due to security restrictions various ports within this range must remain blocked. These ports vary between participating sites. To avoid deadlock situations caused by a port being open at one site but blocked at another, a file containing a comprehensive list of all blocked ports at all participating sites in the 9000 to 9999 range is provided with the MPSCP software. The file is used by MPSCP to avoid assigning blocked ports for file transfer operations.
The latest BC-approved MPSCP file transfer code configuration and blocked-ports files are now part of the openssh kit and can be obtained from the Kirby website at:
https://www.hpcmo.hpc.mil/security/kerberos/private/ [login required]
After login, follow the software link to the latest version of the openssh kit. The openssh kits can be installed into alternate locations.
The appearance of hyperlinks does not constitute endorsement by the U.S. Air Force of this website or the information, products, or services contained therein. For other than authorized activities such as military exchanges and morale, welfare and recreation sites, the U.S. Air Force does not exercise any editorial control over the information you may find at these locations. Such links are provided consistent with the stated purpose of this DoD website.