01-10-2019
Does your RedHat server config have these rsh-related config files:
- /etc/xinetd.d/rsh
- /etc/securetty
- ~/.rhosts
- /etc/pam.d/rsh
If so, please cat and compare them, if you have not already.
Also,
Did you check the log files, for example:
Normally, the log files have a lot of clues
9 More Discussions You Might Find Interesting
1. Shell Programming and Scripting
Hi folks,
I wrote a ksh program which run scripts from remote server.
To check the status code I wrote the following function:
check_remote_status()
{
status_code=`tail -1 $installLog`
if ] ; then
echo $errMsg | tee -a $installLog
exit 1
else
echo $validMsg >> $installLog
fi... (9 Replies)
Discussion started by: nir_s
9 Replies
2. UNIX for Dummies Questions & Answers
Hi Friends,
Can any of you explain me about the below line of code?
mn_code=`env|grep "..mn"|awk -F"=" '{print $2}'`
Im not able to understand, what exactly it is doing :confused:
Any help would be useful for me.
Lokesha (4 Replies)
Discussion started by: Lokesha
4 Replies
3. AIX
AIX 4.2
I am trying to do an rsh grep to search for date records inside server logs by doing this :
xx=`date +"%a %b %d"`
rsh xxx grep "^$XX" zzz
gives :
grep: 0652-033 Cannot open Jun.
grep: 0652-033 Cannot open 11.
But if I do :
xx=`date +"%a %b %d"`
grep "^$XX" zzz
it works... (2 Replies)
Discussion started by: Browser_ice
2 Replies
4. AIX
When running a script on a distant server via rsh, what is the $PATH used ?
I had done a script in the /usr/local/bin but the rsh reported it did not find it. So I assume it is using a separate $PATH but how can I find out ? (1 Reply)
Discussion started by: Browser_ice
1 Replies
5. Red Hat
Dear experts,
I'm trying to write a script to calculate the usage of Log Archive in a directory, so if it gets to a point where the directory size is 60%, then send out an FYI.. email. So if then it reaches to 80%, move the logs from that directory.
I have written the script as follow but... (10 Replies)
Discussion started by: Afi_Linux
10 Replies
6. Shell Programming and Scripting
Hi,
I have line in input file as below:
3G_CENTRAL;INDONESIA_(M)_TELKOMSEL;SPECIAL_WORLD_GRP_7_FA_2_TELKOMSEL
My expected output for line in the file must be :
"1-Radon1-cMOC_deg"|"LDIndex"|"3G_CENTRAL|INDONESIA_(M)_TELKOMSEL"|LAST|"SPECIAL_WORLD_GRP_7_FA_2_TELKOMSEL"
Can someone... (7 Replies)
Discussion started by: shis100
7 Replies
7. Shell Programming and Scripting
Hi All,
I have just now started learning awk from the source - Awk - A Tutorial and Introduction - by Bruce Barnett
and the bad part is that I am stuck on the very first example for running the awk script.
The script is as -
#!/bin/sh
# Linux users have to change $8 to $9
awk '
BEGIN ... (6 Replies)
Discussion started by: csrohit
6 Replies
8. UNIX for Dummies Questions & Answers
How to use "mailx" command to do e-mail reading the input file containing email address, where column 1 has name and column 2 containing “To” e-mail address
and column 3 contains “cc” e-mail address to include with same email.
Sample input file, email.txt
Below is an sample code where... (2 Replies)
Discussion started by: asjaiswal
2 Replies
9. Shell Programming and Scripting
Hello.
System : opensuse leap 42.3
I have a bash script that build a text file.
I would like the last command doing :
print_cmd -o page-left=43 -o page-right=22 -o page-top=28 -o page-bottom=43 -o font=LatinModernMono12:regular:9 some_file.txt
where :
print_cmd ::= some printing... (1 Reply)
Discussion started by: jcdole
1 Replies
LEARN ABOUT CENTOS
pam_rhosts
PAM_RHOSTS(8) Linux-PAM Manual PAM_RHOSTS(8)
NAME
pam_rhosts - The rhosts PAM module
SYNOPSIS
pam_rhosts.so
DESCRIPTION
This module performs the standard network authentication for services, as used by traditional implementations of rlogin and rsh etc.
The authentication mechanism of this module is based on the contents of two files; /etc/hosts.equiv (or and ~/.rhosts. Firstly, hosts
listed in the former file are treated as equivalent to the localhost. Secondly, entries in the user's own copy of the latter file is used
to map "remote-host remote-user" pairs to that user's account on the current host. Access is granted to the user if their host is present
in /etc/hosts.equiv and their remote account is identical to their local one, or if their remote account has an entry in their personal
configuration file.
The module authenticates a remote user (internally specified by the item PAM_RUSER connecting from the remote host (internally specified by
the item PAM_RHOST). Accordingly, for applications to be compatible this authentication module they must set these items prior to calling
pam_authenticate(). The module is not capable of independently probing the network connection for such information.
OPTIONS
debug
Print debug information.
silent
Don't print informative messages.
superuser=account
Handle account as root.
MODULE TYPES PROVIDED
Only the auth module type is provided.
RETURN VALUES
PAM_AUTH_ERR
The remote host, remote user name or the local user name couldn't be determined or access was denied by .rhosts file.
PAM_USER_UNKNOWN
User is not known to system.
EXAMPLES
To grant a remote user access by /etc/hosts.equiv or .rhosts for rsh add the following lines to /etc/pam.d/rsh:
#%PAM-1.0
#
auth required pam_rhosts.so
auth required pam_nologin.so
auth required pam_env.so
auth required pam_unix.so
SEE ALSO
rootok(3), hosts.equiv(5), rhosts(5), pam.conf(5), pam.d(5), pam(8)
AUTHOR
pam_rhosts was written by Thorsten Kukuk <kukuk@thkukuk.de>
Linux-PAM Manual 09/19/2013 PAM_RHOSTS(8)