Sponsored Content
Full Discussion: Performance of rsh
Top Forums Shell Programming and Scripting Performance of rsh Post 73971 by jhansrod on Tuesday 7th of June 2005 02:13:04 AM
Old 06-07-2005
Performance of rsh

Hi All

Just wanted to know if its normal for a rsh command to execute slower when the -l user option is used. If not, what can be causing it to be slower. I have normal authentication so no kerberos or other product .....

Thx

J
 

10 More Discussions You Might Find Interesting

1. Shell Programming and Scripting

help with rsh

I am trying to run a Perl script using rsh. I need to be able to capture the return code value, so the calling script can handle failures properly. I cannot modify the Perl script I need to run because we use it for all of our servers. Does anyone have a suggestion? (1 Reply)
Discussion started by: kscase
1 Replies

2. UNIX for Advanced & Expert Users

rsh

Hi, on .rhosts file of server2 I have : server1 user server1 root when I want to issu rsh from server1 to server2 : 1-If I'm root it is OK. 2-if I'm ordinary user I receive permission denied. What is the problem ? What is the solution ? Many thanks in advance. (4 Replies)
Discussion started by: big123456
4 Replies

3. UNIX for Dummies Questions & Answers

about rsh

I have two host ( hostA and hostB ) , now hostA can use " rsh -l userB hostB " to rsh to hostB without input the password , it work fine, but if I modify it to " rsh -l userB hostB -n "ls" " , it will pop the message "Permission denied." , could suggest what is wrong ? thx (1 Reply)
Discussion started by: ust
1 Replies

4. UNIX for Dummies Questions & Answers

help on rsh

hi friends, i've access to three machines mc1,mc2,mc3,on which i can log in as root. and in order to run a simple command on a remote machine(say remote) on which i cant log in,i use a command as; # rsh remote ls the above runs properly but if i do an ls on following it doesnt work # rsh mc2... (1 Reply)
Discussion started by: mxms755
1 Replies

5. Shell Programming and Scripting

Help on rsh

Hi, i need to xecute rsh or rexec command in order to execute the script on multiple server. The problem i am facing is when i execute rsh command with login name and hostname it ask me password interactively can some body help me how i can pass password along with the command or how to... (1 Reply)
Discussion started by: deep022in
1 Replies

6. News, Links, Events and Announcements

Announcing collectl - new performance linux performance monitor

About 4 years ago I wrote this tool inspired by Rob Urban's collect tool for DEC's Tru64 Unix. What makes this tool as different as collect was in its day is its ability to run at a low overhead and collect tons of stuff. I've expanded the general concept and even include data not available in... (0 Replies)
Discussion started by: MarkSeger
0 Replies

7. UNIX for Advanced & Expert Users

Rsh

Hi All, I want to execute a command from my Windows machine to Linux machine using RSH only d:> rsh <Linux machine add> -l <user_name> pwd>dir in linux machine users home directory in .rhosts file I entered the windows machine IP address and user name. In linux etc/hosts.equiv file I... (1 Reply)
Discussion started by: sarwan
1 Replies

8. AIX

Rsh

How to configure rsh for different users in aix? (4 Replies)
Discussion started by: vjm
4 Replies

9. Solaris

rsh

How to enable rsh in solaris (7 Replies)
Discussion started by: durgaprasadr13
7 Replies

10. Red Hat

Rsh

Hi, I issue : rsh ****.16.0.151 -l root ls -l /tmp and I receive : connect to address ***.16.0.151: Connection refused Trying krb4 rsh... In hosts file of remote (***.16.0.151) I have : ***.16.0.202 root Can you help me ? Thank you. (0 Replies)
Discussion started by: big123456
0 Replies
RSH(1)							    BSD General Commands Manual 						    RSH(1)

NAME
rsh -- remote shell SYNOPSIS
rsh [-45FGKdefnuxz] [-U string] [-p port] [-l username] [-P N|O] host [command] DESCRIPTION
rsh authenticates to the rshd(8) daemon on the remote host, and then executes the specified command. rsh copies its standard input to the remote command, and the standard output and error of the remote command to its own. Valid options are: -4, --krb4 The -4 option requests Kerberos 4 authentication. Normally all supported authentication mechanisms will be tried, but in some cases more explicit control is desired. -5, --krb5 The -5 option requests Kerberos 5 authentication. This is analogous to the -4 option. -K, --broken The -K option turns off all Kerberos authentication. The security in this mode relies on reserved ports. The long name is an indica- tion of how good this is. -n, --no-input The -n option directs the input from the /dev/null device (see the BUGS section of this manual page). -d Enable setsockopt(2) socket debugging. -e, --no-stderr Don't use a separate socket for the stderr stream. This can be necessary if rsh-ing through a NAT bridge. -x, --encrypt The -x option enables encryption for all data exchange. This is only valid for Kerberos authenticated connections (see the BUGS sec- tion for limitations). -z The opposite of -x. This is the default, and is mainly useful if encryption has been enabled by default, for instance in the appdefaults section of /etc/krb5.conf when using Kerberos 5. -f, --forward Forward Kerberos 5 credentials to the remote host. Also settable via appdefaults (see krb5.conf). -F, --forwardable Make the forwarded credentials re-forwardable. Also settable via appdefaults (see krb5.conf). -l string, --user=string By default the remote username is the same as the local. The -l option or the username@host format allow the remote name to be speci- fied. -n, --no-input Direct input from /dev/null (see the BUGS section). -p number-or-service, --port=number-or-service Connect to this port instead of the default (which is 514 when using old port based authentication, 544 for Kerberos 5 and non- encrypted Kerberos 4, and 545 for encrytpted Kerberos 4; subject of course to the contents of /etc/services). -P N|O|1|2, --protocol=N|O|1|2 Specifies the protocol version to use with Kerberos 5. N and 2 select protocol version 2, while O and 1 select version 1. Version 2 is believed to be more secure, and is the default. Unless asked for a specific version, rsh will try both. This behaviour may change in the future. -u, --unique Make sure the remote credentials cache is unique, that is, don't reuse any existing cache. Mutually exclusive to -U. -U string, --tkfile=string Name of the remote credentials cache. Mutually exclusive to -u. -x, --encrypt The -x option enables encryption for all data exchange. This is only valid for Kerberos authenticated connections (see the BUGS sec- tion for limitations). -z The opposite of -x. This is the default, but encryption can be enabled when using Kerberos 5, by setting the libdefaults/encrypt option in krb5.conf(5). EXAMPLES
Care should be taken when issuing commands containing shell meta characters. Without quoting, these will be expanded on the local machine. The following command: rsh otherhost cat remotefile > localfile will write the contents of the remote remotefile to the local localfile, but: rsh otherhost 'cat remotefile > remotefile2' will write it to the remote remotefile2. FILES
/etc/hosts SEE ALSO
ktelnet(1), krb_realmofhost(3), krb_sendauth(3), hosts.equiv(5), krb5.conf(5), rhosts(5), kerberos(8) rshd(8) HISTORY
The rsh command appeared in 4.2BSD. AUTHORS
This implementation of rsh was written as part of the Heimdal Kerberos 5 implementation. BUGS
Some shells (notably csh(1)) will cause rsh to block if run in the background, unless the standard input is directed away from the terminal. This is what the -n option is for. The -x options enables encryption for the session, but for both Kerberos 4 and 5 the actual command is sent unencrypted, so you should not send any secret information in the command line (which is probably a bad idea anyway, since the command line can usually be read with tools like ps(1)). Forthermore in Kerberos 4 the command is not even integrity protected, so anyone with the right tools can modify the command. HEIMDAL
February 20, 2004 HEIMDAL
All times are GMT -4. The time now is 06:39 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy