01-18-2008
10 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
I am trying to run a Perl script using rsh. I need to be able to capture the return code value, so the calling script can handle failures properly.
I cannot modify the Perl script I need to run because we use it for all of our servers.
Does anyone have a suggestion? (1 Reply)
Discussion started by: kscase
1 Replies
2. UNIX for Advanced & Expert Users
Hi,
on .rhosts file of server2 I have :
server1 user
server1 root
when I want to issu rsh from server1 to server2 :
1-If I'm root it is OK.
2-if I'm ordinary user I receive permission denied.
What is the problem ? What is the solution ?
Many thanks in advance. (4 Replies)
Discussion started by: big123456
4 Replies
3. UNIX for Dummies Questions & Answers
I have two host ( hostA and hostB ) , now hostA can use " rsh -l userB hostB " to rsh to hostB without input the password , it work fine, but if I modify it to " rsh -l userB hostB -n "ls" " , it will pop the message "Permission denied." , could suggest what is wrong ? thx (1 Reply)
Discussion started by: ust
1 Replies
4. UNIX for Dummies Questions & Answers
hi friends,
i've access to three machines mc1,mc2,mc3,on which i can log in as root.
and in order to run a simple command on a remote machine(say remote) on which i cant log in,i use a command as;
# rsh remote ls
the above runs properly but if i do an ls on following it doesnt work
# rsh mc2... (1 Reply)
Discussion started by: mxms755
1 Replies
5. Shell Programming and Scripting
Hi,
i need to xecute rsh or rexec command in order to execute the script on multiple server.
The problem i am facing is when i execute rsh command with login name and hostname it ask me password interactively
can some body help me how i can pass password along with the command or how to... (1 Reply)
Discussion started by: deep022in
1 Replies
6. UNIX for Advanced & Expert Users
Hi All,
I want to execute a command from my Windows machine to Linux machine using RSH only
d:> rsh <Linux machine add> -l <user_name> pwd>dir
in linux machine users home directory in .rhosts file I entered the windows machine IP address and user name.
In linux etc/hosts.equiv file I... (1 Reply)
Discussion started by: sarwan
1 Replies
7. AIX
How to configure rsh for different users in aix? (4 Replies)
Discussion started by: vjm
4 Replies
8. Solaris
How to enable rsh in solaris (7 Replies)
Discussion started by: durgaprasadr13
7 Replies
9. Red Hat
Hi,
I issue :
rsh ****.16.0.151 -l root ls -l /tmp
and I receive :
connect to address ***.16.0.151: Connection refused
Trying krb4 rsh...
In hosts file of remote (***.16.0.151) I have :
***.16.0.202 root
Can you help me ?
Thank you. (0 Replies)
Discussion started by: big123456
0 Replies
10. Linux
Hi All,
Whenever we are giving rsh localhost date , it give an error "Permission Denied".
RHEL 6 is the version, and we're logging in as "root".
in .rhosts file I have mentioned all the details, and enabled rsh,rsync,rexec,rlogin in /etc/xinetd.d/ file
Please suggest.
Reg,
Muzaffar (7 Replies)
Discussion started by: muzaffar.k
7 Replies
LEARN ABOUT CENTOS
arping
ARPING(8) System Manager's Manual: iputils ARPING(8)
NAME
arping - send ARP REQUEST to a neighbour host
SYNOPSIS
arping [-AbDfhqUV] [-c count] [-w deadline] [-s source] -I interface destination
DESCRIPTION
Ping destination on device interface by ARP packets, using source address source.
OPTIONS
-A The same as -U, but ARP REPLY packets used instead of ARP REQUEST.
-b Send only MAC level broadcasts. Normally arping starts from sending broadcast, and switch to unicast after reply received.
-c count
Stop after sending count ARP REQUEST packets. With deadline option, arping waits for count ARP REPLY packets, until the timeout
expires.
-D Duplicate address detection mode (DAD). See RFC2131, 4.4.1. Returns 0, if DAD succeeded i.e. no replies are received
-f Finish after the first reply confirming that target is alive.
-I interface
Name of network device where to send ARP REQUEST packets.
-h Print help page and exit.
-q Quiet output. Nothing is displayed.
-s source
IP source address to use in ARP packets. If this option is absent, source address is:
o In DAD mode (with option -D) set to 0.0.0.0.
o In Unsolicited ARP mode (with options -U or -A) set to destination.
o Otherwise, it is calculated from routing tables.
-U Unsolicited ARP mode to update neighbours' ARP caches. No replies are expected.
-V Print version of the program and exit.
-w deadline
Specify a timeout, in seconds, before arping exits regardless of how many packets have been sent or received. In this case arping
does not stop after count packet are sent, it waits either for deadline expire or until count probes are answered.
SEE ALSO
ping(8), clockdiff(8), tracepath(8).
AUTHOR
arping was written by Alexey Kuznetsov <kuznet@ms2.inr.ac.ru>. It is now maintained by YOSHIFUJI Hideaki <yoshfuji@skbuff.net>.
SECURITY
arping requires CAP_NET_RAW capability to be executed. It is not recommended to be used as set-uid root, because it allows user to modify
ARP caches of neighbour hosts.
AVAILABILITY
arping is part of iputils package and the latest versions are available in source form at http://www.skbuff.net/iputils/iputils-cur-
rent.tar.bz2.
iputils-121221 10 June 2014 ARPING(8)