03-05-2008
Ah, my bad, I was thinking of rsh. Is that an option for you?
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
hi
what is the main difference between rlogin and telnet? Or they are synonymous
cheers (13 Replies)
Discussion started by: g-e-n-o
13 Replies
2. UNIX for Dummies Questions & Answers
Hello Friends,
I had an IRIX box won't let me login with any IDs (even root) Telnet, Rlogin, SSh. However, I can login by single user with root ID.
Telnet login >>> Connection closed by forgeign host.
Rlogin >>> Connection closed
SSh login >>> connection to address ???.????.???.??? ... (1 Reply)
Discussion started by: anphdula
1 Replies
3. Shell Programming and Scripting
I am logged into an AIX Unix box. From there I want to remotely login to remotely login to an HP-UX Unix box and want to execute a command that will create a file. I want to get the file to the AIX box. Can someon eplease advise how to automate that in a shell script? At the first step I want to... (2 Replies)
Discussion started by: asutoshch
2 Replies
4. Shell Programming and Scripting
Hi Forumers,
Sorry if it's really simple, but I couldn't find a way out. :(
I've to do something like this in a script (csh):
<some commands, variable settings, scripts>
rlogin different_server
<some commands, variable settings, scripts>
After "rlogin", it shows the prompt of the... (5 Replies)
Discussion started by: sumitgarg
5 Replies
5. Solaris
Hi,
I have a Sun Ultra 5 desktop with Solaris 8. When I telnet/rlogin into any other host, the connection closes after few hours of inactivity.
I also have another Windows box which I use rarely. But when I telnet/rlogin into the same hosts using putty, the connection stays for days without any... (5 Replies)
Discussion started by: dr_gsb
5 Replies
6. IP Networking
Hai guys,
Both "rlogin" and "telnet" are used to login remote host.Is there any differece between these 2 commands? (or) are both same?
Thanks (1 Reply)
Discussion started by: Felicia23
1 Replies
7. Shell Programming and Scripting
Hi
I wanted to know if we can write a nested case in UNIX script.
Something like following -
Case ${sDB} in
Srvr1)
case ${sSchema}
Sch1)
DBusr=Username1
DBPwd=Pwd1
;;
Sch2)
DBusr=Username2
... (1 Reply)
Discussion started by: sumeet
1 Replies
8. Shell Programming and Scripting
I want to make a script which will execute a command from a remote server like below
rlogin server1
then
telnet server2
(username, password will be given)
now execute command (it may "ls -l *.txt") and give the output
I've to do this manually but want to make it automatic
Script may... (4 Replies)
Discussion started by: shoeb
4 Replies
9. Shell Programming and Scripting
I am writing a script to do rlogin to another system and execute commands on the remote system, i can successfully login to the remote system but the commands are not sent. i can only use rlogin to get to the remote system.
what can i do? (6 Replies)
Discussion started by: aydj
6 Replies
10. Shell Programming and Scripting
Hi guys, I'm try making to script for eliminate files rlogins.
path1='/home/*'
for i in `cat /etc/passwd |awk -F: '{print $6}'`; do
if test "$i" = "$path1"; then
echo $i
cd $i
if ; then
echo "$i/.rhosts detectado"|mail -s "rhosts" root
... (14 Replies)
Discussion started by: nena_redbalon
14 Replies
LEARN ABOUT OPENSOLARIS
restricted_shell
rsh(1M) System Administration Commands rsh(1M)
NAME
rsh, restricted_shell - restricted shell command interpreter
SYNOPSIS
/usr/lib/rsh [-acefhiknprstuvx] [argument]...
DESCRIPTION
rsh is a limiting version of the standard command interpreter sh, used to restrict logins to execution environments whose capabilities are
more controlled than those of sh (see sh(1) for complete description and usage).
When the shell is invoked, it scans the environment for the value of the environmental variable, SHELL. If it is found and rsh is the file
name part of its value, the shell becomes a restricted shell.
The actions of rsh are identical to those of sh, except that the following are disallowed:
o changing directory (see cd(1)),
o setting the value of $PATH,
o pecifying path or command names containing /,
o redirecting output (> and >>).
The restrictions above are enforced after .profile is interpreted.
A restricted shell can be invoked in one of the following ways:
1. rsh is the file name part of the last entry in the /etc/passwd file (see passwd(4));
2. the environment variable SHELL exists and rsh is the file name part of its value; the environment variable SHELL needs to be set
in the .login file;
3. the shell is invoked and rsh is the file name part of argument 0;
4. the shell is invoke with the -r option.
When a command to be executed is found to be a shell procedure, rsh invokes sh to execute it. Thus, it is possible to provide to the end-
user shell procedures that have access to the full power of the standard shell, while imposing a limited menu of commands; this scheme
assumes that the end-user does not have write and execute permissions in the same directory.
The net effect of these rules is that the writer of the .profile (see profile(4)) has complete control over user actions by performing
guaranteed setup actions and leaving the user in an appropriate directory (probably not the login directory).
The system administrator often sets up a directory of commands (that is, /usr/rbin) that can be safely invoked by a restricted shell. Some
systems also provide a restricted editor, red.
EXIT STATUS
Errors detected by the shell, such as syntax errors, cause the shell to return a non-zero exit status. If the shell is being used non-
interactively execution of the shell file is abandoned. Otherwise, the shell returns the exit status of the last command executed.
ATTRIBUTES
See attributes(5) for descriptions of the following attributes:
+-----------------------------+-----------------------------+
| ATTRIBUTE TYPE | ATTRIBUTE VALUE |
+-----------------------------+-----------------------------+
|Availability |SUNWcsu |
+-----------------------------+-----------------------------+
SEE ALSO
intro(1), cd(1), login(1), rsh(1), sh(1), exec(2), passwd(4), profile(4), attributes(5)
NOTES
The restricted shell, /usr/lib/rsh, should not be confused with the remote shell, /usr/bin/rsh, which is documented in rsh(1).
SunOS 5.11 1 Nov 1993 rsh(1M)