05-16-2005
First off, you need to test in a more logical way (which you may have done but it isn't posted as such).
From hp64linux20 - rsh to hp4linux21 - then ssh to 21. Show the results.
Do the same for each system.
Second, it doesn't make sense that you can ssh but not rsh and you get a "No route to host" - the route would have to be there if ssh worked.
Third, "Connection refused" means rsh isn't allowed - turned off due to security reasons - stick with ssh.
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
I am using rsh and other R commands to login to a machine.
On that target machine, I set up $HOME/.rhosts file with the host/password.
I also setup /etc/hosts.equiv fiel with IP address/username.
I also made sure that rsh was enabled and that no firewall was running.
The /etc/hosts on... (7 Replies)
Discussion started by: etc
7 Replies
2. UNIX for Advanced & Expert Users
Hi,
on .rhosts file of server2 I have :
server1 user
server1 root
when I want to issu rsh from server1 to server2 :
1-If I'm root it is OK.
2-if I'm ordinary user I receive permission denied.
What is the problem ? What is the solution ?
Many thanks in advance. (4 Replies)
Discussion started by: big123456
4 Replies
3. UNIX for Dummies Questions & Answers
I have two host ( hostA and hostB ) , now hostA can use " rsh -l userB hostB " to rsh to hostB without input the password , it work fine, but if I modify it to " rsh -l userB hostB -n "ls" " , it will pop the message "Permission denied." , could suggest what is wrong ? thx (1 Reply)
Discussion started by: ust
1 Replies
4. UNIX for Dummies Questions & Answers
hi friends,
i've access to three machines mc1,mc2,mc3,on which i can log in as root.
and in order to run a simple command on a remote machine(say remote) on which i cant log in,i use a command as;
# rsh remote ls
the above runs properly but if i do an ls on following it doesnt work
# rsh mc2... (1 Reply)
Discussion started by: mxms755
1 Replies
5. UNIX for Advanced & Expert Users
Hi All,
I want to execute a command from my Windows machine to Linux machine using RSH only
d:> rsh <Linux machine add> -l <user_name> pwd>dir
in linux machine users home directory in .rhosts file I entered the windows machine IP address and user name.
In linux etc/hosts.equiv file I... (1 Reply)
Discussion started by: sarwan
1 Replies
6. AIX
Hi,
I have a server which I've configured to allow an rsh trust from a csm server. However, of the 3 vlans on the target server, I can only rsh to one of them without being prompted for the password.
On lpar1
$ ifconfig -a
en2:... (1 Reply)
Discussion started by: m223464
1 Replies
7. Solaris
Hello guys, I have a script in a Linux server, from where I go to 3 Sun servers and run process.
Now i have done an upgrade and increase 1 Sun server more, now i need to run the shell in the Linux Server (into the shell is rsh command), but when i try to do ir with the new Sun server, i hace the... (3 Replies)
Discussion started by: lestat_ecuador
3 Replies
8. AIX
How to configure rsh for different users in aix? (4 Replies)
Discussion started by: vjm
4 Replies
9. Solaris
How to enable rsh in solaris (7 Replies)
Discussion started by: durgaprasadr13
7 Replies
10. Red Hat
Hi,
I issue :
rsh ****.16.0.151 -l root ls -l /tmp
and I receive :
connect to address ***.16.0.151: Connection refused
Trying krb4 rsh...
In hosts file of remote (***.16.0.151) I have :
***.16.0.202 root
Can you help me ?
Thank you. (0 Replies)
Discussion started by: big123456
0 Replies
LEARN ABOUT LINUX
ssh-keysign
SSH-KEYSIGN(8) BSD System Manager's Manual SSH-KEYSIGN(8)
NAME
ssh-keysign -- ssh helper program for host-based authentication
SYNOPSIS
ssh-keysign
DESCRIPTION
ssh-keysign is used by ssh(1) to access the local host keys and generate the digital signature required during host-based authentication with
SSH protocol version 2.
ssh-keysign is disabled by default and can only be enabled in the global client configuration file /etc/ssh/ssh_config by setting
EnableSSHKeysign to ``yes''.
ssh-keysign is not intended to be invoked by the user, but from ssh(1). See ssh(1) and sshd(8) for more information about host-based authen-
tication.
FILES
/etc/ssh/ssh_config
Controls whether ssh-keysign is enabled.
/etc/ssh/ssh_host_dsa_key
/etc/ssh/ssh_host_ecdsa_key
/etc/ssh/ssh_host_rsa_key
These files contain the private parts of the host keys used to generate the digital signature. They should be owned by root, read-
able only by root, and not accessible to others. Since they are readable only by root, ssh-keysign must be set-uid root if host-
based authentication is used.
/etc/ssh/ssh_host_dsa_key-cert.pub
/etc/ssh/ssh_host_ecdsa_key-cert.pub
/etc/ssh/ssh_host_rsa_key-cert.pub
If these files exist they are assumed to contain public certificate information corresponding with the private keys above.
SEE ALSO
ssh(1), ssh-keygen(1), ssh_config(5), sshd(8)
HISTORY
ssh-keysign first appeared in OpenBSD 3.2.
AUTHORS
Markus Friedl <markus@openbsd.org>
BSD
August 31, 2010 BSD