10 More Discussions You Might Find Interesting
1. Linux
Hi All,
Whenever we are giving rsh localhost date , it give an error "Permission Denied".
RHEL 6 is the version, and we're logging in as "root".
in .rhosts file I have mentioned all the details, and enabled rsh,rsync,rexec,rlogin in /etc/xinetd.d/ file
Please suggest.
Reg,
Muzaffar (7 Replies)
Discussion started by: muzaffar.k
7 Replies
2. Infrastructure Monitoring
Hello
I really wonder what's trap in etc/profile and in each user .profile.
I try to google for it but I think I have no luck. Mostly hit is SNMP traps which I think it is not the same thing.
I want to know ...
1. What's a "trap 2 3" means and are there any other value I can set... (4 Replies)
Discussion started by: Smith
4 Replies
3. Red Hat
Hi,
I issue :
rsh ****.16.0.151 -l root ls -l /tmp
and I receive :
connect to address ***.16.0.151: Connection refused
Trying krb4 rsh...
In hosts file of remote (***.16.0.151) I have :
***.16.0.202 root
Can you help me ?
Thank you. (0 Replies)
Discussion started by: big123456
0 Replies
4. UNIX for Dummies Questions & Answers
What is the difference between /etc/profile and .profile? (5 Replies)
Discussion started by: gehlnar
5 Replies
5. UNIX for Advanced & Expert Users
Hi All,
I want to execute a command from my Windows machine to Linux machine using RSH only
d:> rsh <Linux machine add> -l <user_name> pwd>dir
in linux machine users home directory in .rhosts file I entered the windows machine IP address and user name.
In linux etc/hosts.equiv file I... (1 Reply)
Discussion started by: sarwan
1 Replies
6. Linux
Hi All,
I want to execute a command from my Windows machine to Linux machine.
d:> rsh <Linux machine add> -l <user_name> pwd>dir
in linux machine users home directory in .rhosts file I entered the windows machine IP address and user name.
In linux etc/hosts.equiv file I entered the... (1 Reply)
Discussion started by: sarwan
1 Replies
7. UNIX for Dummies Questions & Answers
Hi
I know from reading O Riley's Classic Shell Scripting' that the .profile file is " the shells configuration file" but I am unable to find a reference to what "..profile" means. I have searched on the net, Sams Teach Yourself Unix, Unix Visual Quickstart Guide and Linux in a Nutshell. I have... (2 Replies)
Discussion started by: zorrokan
2 Replies
8. SCO
what is the difference between these two lines, if we use it in korn shell script:
.profile
.~/.profile (3 Replies)
Discussion started by: maneesh mehta
3 Replies
9. UNIX for Dummies Questions & Answers
hi , i added ls -F to .profile. and i need to do ./.profile for the effect to take effect BUT i didnt and YET the next day when i came to work and log in, the changes took effect. i am on aix.
please explain..
thanks (4 Replies)
Discussion started by: yls177
4 Replies
10. Shell Programming and Scripting
I am trying to run a Perl script using rsh. I need to be able to capture the return code value, so the calling script can handle failures properly.
I cannot modify the Perl script I need to run because we use it for all of our servers.
Does anyone have a suggestion? (1 Reply)
Discussion started by: kscase
1 Replies
RSH() RSH()
NAME
rsh - remote shell
SYNOPSIS
rsh host [-l username] [-n] [-d] [-k realm] [-f | -F] [-x] [-PN | -PO] command
DESCRIPTION
Rsh connects to the specified host, and executes the specified command. Rsh copies its standard input to the remote command, the standard
output of the remote command to its standard output, and the standard error of the remote command to its standard error. This implementa-
tion of rsh will accept any port for the standard error stream. Interrupt, quit and terminate signals are propagated to the remote com-
mand; rsh normally terminates when the remote command does.
Each user may have a private authorization list in a file .k5login in his login directory. Each line in this file should contain a Ker-
beros principal name of the form principal/instance@realm. If there is a ~/.k5login file, then access is granted to the account if and
only if the originater user is authenticated to one of the princiapls named in the ~/.k5login file. Otherwise, the originating user will
be granted access to the account if and only if the authenticated principal name of the user can be mapped to the local account name using
the aname -> lname mapping rules (see krb5_anadd(8) for more details).
OPTIONS
-l username
sets the remote username to username. Otherwise, the remote username will be the same as the local username.
-x causes the network session traffic to be encrypted.
-f cause nonforwardable Kerberos credentials to be forwarded to the remote machine for use by the specified command. They will be
removed when command finishes. This option is mutually exclusive with the -F option.
-F cause forwardable Kerberos credentials to be forwarded to the remote machine for use by the specified command. They will be removed
when command finishes. This option is mutually exclusive with the -f option.
-k realm
causes rsh to obtain tickets for the remote host in realm instead of the remote host's realm as determined by krb_realmofhost(3).
-d turns on socket debugging (via setsockopt(2)) on the TCP sockets used for communication with the remote host.
-n redirects input from the special device /dev/null (see the BUGS section below).
-PN
-PO Explicitly request new or old version of the Kerberos ``rcmd'' protocol. The new protocol avoids many security problems found in
the old one, but is not interoperable with older servers. (An "input/output error" and a closed connection is the most likely
result of attempting this combination.) If neither option is specified, some simple heuristics are used to guess which to try.
If you omit command, then instead of executing a single command, you will be logged in on the remote host using rlogin(1).
Shell metacharacters which are not quoted are interpreted on the local machine, while quoted metacharacters are interpreted on the remote
machine. Thus the command
rsh otherhost cat remotefile >> localfile
appends the remote file remotefile to the local file localfile, while
rsh otherhost cat remotefile ">>" otherremotefile
appends remotefile to otherremotefile.
FILES
/etc/hosts
~/.k5login (on remote host) - file containing Kerberos principals that are allowed access.
SEE ALSO
rlogin(1), kerberos(3), krb_sendauth(3), krb_realmofhost(3)
BUGS
If you are using csh(1) and put a rsh(1) in the background without redirecting its input away from the terminal, it will block even if no
reads are posted by the remote command. If no input is desired you should redirect the input of rsh to /dev/null using the -n option.
You cannot run an interactive command (like rogue(6) or vi(1)); use rlogin(1).
Stop signals stop the local rsh process only; this is arguably wrong, but currently hard to fix for reasons too complicated to explain
here.
RSH()