12-22-2009
Quote:
Originally Posted by
DukeNuke2
does
this help?
also why not use ssh?
Is there a difference? Besides ssh being encrypted. I assume since I'm doing this within my network I won't need to encrypt the anything.
---------- Post updated at 04:24 PM ---------- Previous update was at 03:54 PM ----------
Quote:
Originally Posted by
DukeNuke2
It helped at first, when they said to install rsh-server from the repos. But then when they went on to say they had a problem with it, the final post at the bottom says what needs to be running but doesn't really elaborate on how to do so. I went to the link he posted, and didn't find much help. I also googled the things he suggested and still got nowhere. I'm still getting a 'connection timed out' error even though I installed rsh-server and configured
/etc/hosts.equiv and
/$HOME/.rhosts with help of the
tutorial I found.
10 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
Hi all,
I have a file on a remote machine and I want to do a cut operation on that file.
So, I have been doing
rsh <remote> " cut -d " " -f 2 <filename> "
cut: invalid delimiter
But, when I get the file to the local machine and run the same command, I get... (1 Reply)
Discussion started by: eamani_sun
1 Replies
2. Shell Programming and Scripting
Hi,
I want to do a awk operation on a file on a remote machine.
I am using rsh for this.
rsh <remote> awk '{print $2}' process.txt
output:
awk: syntax error near line 1
awk:illegal statement near line 1
I can do the awk operation by logging into the remote machine.
Can... (1 Reply)
Discussion started by: eamani_sun
1 Replies
3. Solaris
hi,
I have some windows client machines which require a signal to be sent by a Solaris machine( SunOS 5.6) when ever a particular event occurs on that Solaris machine. What are possible communication mechanisms by which i can do this.
the constraints are
> the windows machines have to... (7 Replies)
Discussion started by: Krsh
7 Replies
4. IP Networking
I have to work with NS2 (Network Simulator)and i have to install it beforeusing it on Manets Simulations.
Can some one Help me on this topic?
Thank's (1 Reply)
Discussion started by: hakim19
1 Replies
5. Red Hat
Hi All,
URGENT - Please help me form a scipt for this:
I need the LATEST file from a dir on REMOTE machine to be SCP'd to a dir on local machine. (and I need to execute this from local server)
I know that the below cmd is used to find the LATEST file from a dir. But this command is not... (3 Replies)
Discussion started by: me_ub
3 Replies
6. Linux
Hi,
I want to rsh to other machine & run a script, but it is nt working
eg:
rsh host command
but after this it doesn't login into that machine & run the command on y machine
but if i write rsh host
then after loggi i write commands it works. Is i am doing something wrong. I jus need... (2 Replies)
Discussion started by: sarbjit
2 Replies
7. Ubuntu
How can I learn what time OS installed time and release information. (4 Replies)
Discussion started by: getrue
4 Replies
8. Shell Programming and Scripting
Hi All..
Am new to Unix!!
Am creating a shell script in which a scenario is like i have transfer the output file from unix machine (Server) to local directory (Windows xp).
And also i have to transfer the input file from the local directory to Unix machine (Server)
Any help from you... (1 Reply)
Discussion started by: vidhyaS
1 Replies
9. Shell Programming and Scripting
How to use Net connector(Dongle) in Ubuntu 12.04??? (from the command line or manually)Plz reply soon. (4 Replies)
Discussion started by: Varsha katre
4 Replies
10. Linux
Hi,
Could you please help me with the below issue..
I'm running RHEL6 OS on both server (192.168.0.10) and client machines (192.168.0.1).
I'm trying to connect to server from the client machine using ftp service.
I have installed vsftpd daemon on both the machines.
I'm getting... (4 Replies)
Discussion started by: raosr020
4 Replies
LEARN ABOUT DEBIAN
krb5-rsh
RSH(1) General Commands Manual RSH(1)
NAME
rsh - remote shell
SYNOPSIS
rsh host [-l username] [-n] [-d] [-k realm] [-f | -F] [-x] [-PN | -PO] command
DESCRIPTION
Rsh connects to the specified host, and executes the specified command. Rsh copies its standard input to the remote command, the standard
output of the remote command to its standard output, and the standard error of the remote command to its standard error. This implementa-
tion of rsh will accept any port for the standard error stream. Interrupt, quit and terminate signals are propagated to the remote com-
mand; rsh normally terminates when the remote command does.
Each user may have a private authorization list in a file .k5login in his login directory. Each line in this file should contain a Ker-
beros principal name of the form principal/instance@realm. If there is a ~/.k5login file, then access is granted to the account if and
only if the originater user is authenticated to one of the princiapls named in the ~/.k5login file. Otherwise, the originating user will
be granted access to the account if and only if the authenticated principal name of the user can be mapped to the local account name using
the aname -> lname mapping rules (see krb5_anadd(8) for more details).
OPTIONS
-l username
sets the remote username to username. Otherwise, the remote username will be the same as the local username.
-x causes the network session traffic to be encrypted. This applies only to the input and output streams, and not the command line.
-f cause nonforwardable Kerberos credentials to be forwarded to the remote machine for use by the specified command. They will be
removed when command finishes. This option is mutually exclusive with the -F option.
-F cause forwardable Kerberos credentials to be forwarded to the remote machine for use by the specified command. They will be removed
when command finishes. This option is mutually exclusive with the -f option.
-k realm
causes rsh to obtain tickets for the remote host in realm instead of the remote host's realm as determined by krb_realmofhost(3).
-d turns on socket debugging (via setsockopt(2)) on the TCP sockets used for communication with the remote host.
-n redirects input from the special device /dev/null (see the BUGS section below).
-PN
-PO Explicitly request new or old version of the Kerberos ``rcmd'' protocol. The new protocol avoids many security problems found in
the old one, but is not interoperable with older servers. (An "input/output error" and a closed connection is the most likely
result of attempting this combination.) If neither option is specified, some simple heuristics are used to guess which to try.
If you omit command, then instead of executing a single command, you will be logged in on the remote host using rlogin(1).
Shell metacharacters which are not quoted are interpreted on the local machine, while quoted metacharacters are interpreted on the remote
machine. Thus the command
rsh otherhost cat remotefile >> localfile
appends the remote file remotefile to the local file localfile, while
rsh otherhost cat remotefile ">>" otherremotefile
appends remotefile to otherremotefile.
FILES
/etc/hosts
~/.k5login (on remote host) - file containing Kerberos principals that are allowed access.
SEE ALSO
rlogin(1), kerberos(3), krb_sendauth(3), krb_realmofhost(3), kshd(8)
BUGS
If you are using csh(1) and put a rsh(1) in the background without redirecting its input away from the terminal, it will block even if no
reads are posted by the remote command. If no input is desired you should redirect the input of rsh to /dev/null using the -n option.
You cannot run an interactive command (like rogue(6) or vi(1)); use rlogin(1).
Stop signals stop the local rsh process only; this is arguably wrong, but currently hard to fix for reasons too complicated to explain
here.
RSH(1)