Sponsored Content
Full Discussion: Rsh passwordless entry
Operating Systems Linux Ubuntu Rsh passwordless entry Post 302887894 by rbatte1 on Tuesday 11th of February 2014 12:06:14 PM
Old 02-11-2014
You need to open a simple telnet session from A to B first, then look at where the login is from:-
Code:
ServerA telnet ServerB
Login: username
Password: password

Welcome to ServerB!

ServerB who am i
username    pts/t0    aaa.bbb.ccc.ddd

Now you can use this information as it is displayed. Hopefully aaa.bbb.ccc.ddd is a name rather than an IP address as you have included it in /etc/hosts (ServerB will have done a lookup) but really all you need to do is to add the address into your .rhosts file in your home directory rather than the global /etc/hosts.equiv which permits wider access. Esure that this file is RW to yourself and no-one else:-
Code:
ServerB chmod 700 .rhosts

Then exit the telnet session to ServerB and from ServerA again, try:-
Code:
ServerA rsh ServerB hostname

Hopefully it will display the hostname of ServerB and you can then try variations on the command. Quoting and knowing which shell with expand metacharacters or interpret variables can be quite tricky though.

Have a go and let us know how you get on. I hope that this helps.

If you still can't get on, check that the port is listening. You are after ports 513 & 514. If they are not listening, you may have to alter /etc/xinet.d/* to make sure that they are not disabled. Do not save backup versions of these files in the same directory or they will be considered live too, which can get messy - he says from experience Smilie


Robin
Liverpool/Blackburn
UK
 

10 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

Passwordless SFTP

Hi, When Iam trying to do SFTP it is asking for password everytime. Can I have any alternative where I can provide the password in script itself. Because there are some control-M jobs which runs without user interaction. So please let me know the script where we can provide the password in the... (2 Replies)
Discussion started by: manneni prakash
2 Replies

2. HP-UX

Help on passwordless ssh...

Hi, Can someone help me on ssh-keygen usage...? I used ssh-keygen after which "id.pub" file was generated in system1's > .ssh directory... I copied the same into the remote system system2 > .ssh directory as "authorized_keys" file. Now i tried ssh connection from system 1 to system... (7 Replies)
Discussion started by: EmbedUX
7 Replies

3. UNIX for Dummies Questions & Answers

passwordless ssh

hi, i have tried with passwordless shh in google.. i followed the below steps ... user:~> ssh-keygen -t rsa Enter file in which to save the key (/home/cantin/.ssh/id_rsa):key.txt Enter passphrase (empty for no passphrase): Enter same passphrase again: till this step i... (0 Replies)
Discussion started by: arunmanas
0 Replies

4. Shell Programming and Scripting

su -m <user> passwordless?

Hi! I am working on mac osx and have a script which prompts for password for a non-root user, can I avoid that? su -m <user> Prompts for a password. Its a startup script and the start up fails? How can I fix this? Thanks, Jack. (4 Replies)
Discussion started by: jacki
4 Replies

5. Shell Programming and Scripting

passwordless ssh

My main concern is, i have to login into 300 linux server and all are having same userid and password. I dont want to create any key for each server to login . Is there a way to run the shell script ? (3 Replies)
Discussion started by: Mani2512
3 Replies

6. AIX

passwordless entry using ssh from one user to a different user on the same server

Hi, We have a requirement to do passwordless entry from one user to a different user on the same AIX server using ssh keys. Can some one help me with this? Thanks in advance, Panditt (3 Replies)
Discussion started by: deshaipet
3 Replies

7. UNIX for Advanced & Expert Users

Passwordless ssh

Hi I have created a user on a linux server and created a passwordless ssh key. I've echoed the key into the authorized_keys file for the user. I've added a series of forced commands to the key. From my laptop - logged in as myself - I can ssh into the server as that user and the commands... (3 Replies)
Discussion started by: steadyonabix
3 Replies

8. Solaris

Passwordless connections

Hi All! Please help me with this situation: I have 3 servers configured with the following network 10.100.48.xx and I have configured on the passwordless connection, and it is working fine. Now the app vendor ask me to configure a 2nd IP address on each of the 3 servers with a different IP... (4 Replies)
Discussion started by: fretagi
4 Replies

9. How to Post in the The UNIX and Linux Forums

Help me, write a bash script to delete parent entry with all their child entry in LDAP UNIX server

Hi All, Please help me and guide me to write a bash/shell script on Linux box to delete parent entry with all their child entries. example: Parent is : ---------- dn: email=yogesh.kumar@wipro.com, o=wipro, o=in child is: ---------- dn: cn: yogesh kumar, email=yogesh.kumar@wipro.com,... (1 Reply)
Discussion started by: Chand
1 Replies

10. Shell Programming and Scripting

How to replace multiple "&nbsp;" entry with in <td> tag into single entry using sed?

I have the input file like this. Input file: 12.txt 1) There are one or more than one <tr> tags in same line. 2) Some tr tags may have one <td> or more tna one <td> tags within it. 3) Few <td> tags having "<td> &nbsp; </td>". Few having more than one "&nbsp;" entry in it. <tr> some td... (4 Replies)
Discussion started by: thomasraj87
4 Replies
rhosts(4)						     Kernel Interfaces Manual							 rhosts(4)

NAME
rhosts, .rhosts - Specifies remote users that can use a local user account SYNOPSIS
$HOME/.rhosts DESCRIPTION
The .rhosts file contains a list of remote users who are not required to supply a login password when they execute the rcp, rlogin, and rsh commands using a local user account. The .rhosts file is a hidden file in your home directory. It must be owned by you or the root user and it must not be writable by group or world, otherwise, it is not used. Moreover, although it is not required, it is sensible to set the permissions of the file to 600, so the file is not readable by group or world. Each entry in the file is of the following form: host [user] where: The name of the remote host. If the remote host is in a different domain than the local host, the full domain name must be speci- fied. The login name of the remote user. This field is optional. If this field is not specified, any user on the specified remote host is exempt from providing a password, and is assumed to have the same username on both the local and remote hosts. Optionally, an NIS netgroup name can be specified for the host name, user name, or both. Entries in the .rhosts file are either positive or negative. Positive entries allow access; negative entries deny access. The following entries are positive: hostname username +@netgroup In addition, the plus sign (+) can be used in place of the hostname or username. In place of the hostname, it means any remote host. In place of the username, it means any user. The following entries are negative: -hostname -username -@netgroup EXAMPLES
The following sample entries in the /u/chen/.rhosts file on host zeus allow users moshe and pierre at remote host venus and user robert at the hosts specified in the NIS netgroup chicago to log in to user chen's home directory on host zeus: venus moshe venus pierre +@chicago robert FILES
Specifies remote users who can use a local user account. RELATED INFORMATION
Commands: rcp(1), rlogin(1), rsh(1). Functions: ruserok(3). Files: hosts.equiv(4), netgroup(4). Functions: rcmd(3). delim off rhosts(4)
All times are GMT -4. The time now is 04:48 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy