*nix Documentation Project
·  Home
 +   man pages
·  Linux HOWTOs
·  FreeBSD Tips
·  *niX Forums

  man pages->Tru64 Unix man pages -> rsh (1)              
Title
Content
Arch
Section
 

rsh(1)

Contents


NAME    [Toc]    [Back]

       rsh  -  Executes  a  specified command on a remote host or
       logs into a remote host

SYNOPSIS    [Toc]    [Back]

       rsh [-dfnx] [-l user] remote_host [command]  [argument...]

       The  remote  shell  command  (rsh) executes command at the
       remote_host, or, if no command  is  specified,  logs  into
       remote_host.

OPTIONS    [Toc]    [Back]

       Turns  on socket debugging (using setsockopt()) on the TCP
       sockets used  for  communication  with  the  remote  host.
       Copies  your  Kerberos  ticket  from the local host to the
       remote host to establish your Kerberos credentials on  the
       remote  host.  This  option  requires  that  the local and
       remote hosts be configured to use Kerberos  authentication
       in  the  same  or  trusting  Kerberos realms. The Kerberos
       ticket will remain on the  remote  host  until  it  either
       expires  or  it  is explicitly destroyed. The -f option is
       ignored when used with the -l option.   Specifies  to  log
       into  the remote host using the specified username instead
       of the local username.  If this option is  not  specified,
       the  local  and  remote usernames are the same.  Specifies
       that the rsh command is to ignore input from  STDIN.   Use
       this option if you put rsh in the background without redirecting
 its input away from the terminal. If  you  do  not
       use  this  option in this situation, rsh blocks even if no
       reads are posted by the remote command.  Encrypts the data
       transmitted  between  the  local host and the remote host.
       This option requires that the local and  remote  hosts  be
       configured  to  use Kerberos authentication in the same or
       trusting Kerberos realms.

DESCRIPTION    [Toc]    [Back]

       The rsh command sends standard input from a local host  to
       a  remote  host  and receives standard output and standard
       error from the remote host. By default,  the  rsh  command
       executes  the  rlogin command if you do not specify a command.


       While the remote command is executing, pressing the Interrupt,
  Terminate,  or  Quit key sequences sends the corresponding
 signal to the remote process.  However,  pressing
       the  Stop  key sequence stops only the local process. Normally,
 when the remote command terminates, the  local  rsh
       process terminates.

       By  default,  metacharacters  are interpreted by the local
       shell. To have shell  metacharacters  interpreted  on  the
       remote   host,  place  the  metacharacters  inside  double
       quotes.

       The way that the remote  host  authenticates  a  user  and
       transmits  data  depends  on if the local and remote hosts
       are using a basic connection or a secure connection  (Kerberos
  or Secure Shell). Basic and secure connections provide
 user authentication;  however,  a  secure  connection
       also  provides  client  and  server  authentication,  data
       encryption, data integrity, and nonrepudiation.


   Basic Connection    [Toc]    [Back]
       A basic connection is one where the rsh  command  connects
       to  the  remote host and the remote host authenticates the
       user if one of the following conditions is  satisfied:  If
       the  local  user  ID is not the root user, and the name of
       the local host is listed as  an  equivalent  host  in  the
       /etc/hosts.equiv  file  on  the remote host.  If the local
       user  ID  is  the  root  user   or   if   the   check   of
       /etc/hosts.equiv  fails,  the user's home directory on the
       remote host must contain a $HOME/.rhosts file  that  lists
       the  local host name and user name. The $HOME/.rhosts file
       must be owned by either the remote user or the root  user,
       and  have  permissions set to 600 (read and write by owner
       only).

       The rsh command allows access to the remote  host  if  the
       remote  user  account  does  not  have a password defined.
       However, for security reasons, use of a  password  on  all
       user accounts is recommended.

   Secure Connection    [Toc]    [Back]
       A  secure connection is one where the rsh command connects
       to the remote host by  using  either  Kerberos  or  Secure
       Shell.  Kerberos and Secure Shell are client/server applications
 that authenticate the client,  server,  and  user;
       encrypt  data;  and  ensure data integrity and nonrepudiation.
  See your system administrator to determine if  your
       system  is  running Kerberos or Secure Shell software. See
       the Security Administration  guide  for  more  information
       about Kerberos and Secure Shell.

       Kerberos    [Toc]    [Back]

       Kerberos  does  not  use  the  /etc/host.equiv file or the
       $HOME/.rhosts file for authentication. Kerberos  authenticates
 by using secret-key cryptography and tickets between
       Kerberos clients and  Kerberos  servers  in  the  same  or
       trusting  Kerberos realms. Once authenticated by Kerberos,
       users receive a Kerberos  Ticket  Granting  Ticket  (TGT).
       Users  with a valid TGT are not prompted for a username or
       password when the remote host is in the same  or  trusting
       Kerberos realm.

       To use Kerberos to execute a command or log in to a remote
       host, enter the rsh command with the -f and -x options.

       Secure Shell    [Toc]    [Back]

       Secure Shell authenticates users by using passwords, hostbased
  identification,  or public and private keys between
       Secure Shell clients and servers.

       By default, the rsh command  will  use  Kerberos  (with  a
       valid  TGT)  when  a system is configured to use both Kerberos
 and Secure Shell.

       To use Secure Shell to execute a command or log  in  to  a
       remote  host, enter the Secure Shell ssh2 (or ssh) command
       instead of the rsh command. The ssh2 command provides  the
       same  functionality  and options as the rsh command over a
       secure connection. See ssh2(1)  for  more  information  on
       using the Secure Shell ssh2 command.

       Alternatively,  you can configure the rsh, rlogin, and rcp
       commands and applications that use the rcmd() function  to
       automatically  use  a  Secure Shell connection by enabling
       the  Secure  Shell  EnforceSecureRutils  keyword  in   the
       /etc/ssh2/ssh2_config     file     or    in    a    user's
       $HOME/.ssh2/ssh2_config file. When the EnforceSecureRutils
       keyword  is  enabled:  The sshd daemon runs and spawns the
       srcmd child process; the rshd daemon does  not  run.   The
       rsh command can only use Secure Shell host-based authentication
 to authenticate users.

       See Security Administration  for  more  information  about
       configuring Secure Shell host-based authentication and the
       EnforceSecureRutils keyword.

       After it is determined that Secure Shell will be used, all
       authentication  and  communication  between the client and
       server will use the Secure Shell connection. A  connection
       is not established if a user cannot be authenticated.

RESTRICTIONS    [Toc]    [Back]

       The  rsh  command  is confused by output generated by commands
 in a file on the remote host.   In  particular,  the
       messages, where are you?  and stty: Can't assign requested
       address can result if output is generated by  the  startup
       file.

EXAMPLES    [Toc]    [Back]

       In  the following examples, the local host host1 is listed
       in the /etc/hosts.equiv file at the remote host host2.  To
       check  the  amount  of  free disk space on the remote host
       host2, enter: $ rsh host2 df To append a  remote  file  to
       another  file on the remote host, place the >> metacharacters
 in  (double quotes): $ rsh host2 cat test1 ">>" test2
       To  append  a  remote  file  at the remote host to a local
       file, omit the double quotes: $ rsh  host2  cat  test2  >>
       test3  To  append  a remote file to a local file and use a
       remote user's permissions at the remote host, use  the  -l
       option: $ rsh host2 -l jane cat test4 >> test5


       The  following examples use Kerberos. The local host host1
       and the remote host host2 are in the same Kerberos  realm.
       To  check the amount of free disk space on the remote host
       over an encrypted connection, enter: $ rsh -x host2 df  To
       execute  a command and forward your Kerberos ticket to the
       remote host, enter: $ rsh -f host2 df

FILES    [Toc]    [Back]

       Specifies remote hosts from which users can  execute  commands
  on  the  local  host  (provided these users have an
       account on the local host).  Specifies remote  users  that
       can  use  a  local  user  account.  Specifies Secure Shell
       client configuration information.  Specifies Secure  Shell
       server configuration information.

SEE ALSO    [Toc]    [Back]

      
      
       Commands:  kinit(1),    kdestroy(1),   klist(1),   rcp(1),
       rlogin(1), rshd(8), ssh2(1), telnet(1)

       Functions:  rexec(3), rcmd(3)

       Files: hosts.equiv(4), rhosts(4), ssh2_config(4)

       Guides: Security Administration



                                                           rsh(1)
[ Back ]
 Similar pages
Name OS Title
telnet Tru64 Logs into a remote host
rlogin Tru64 Logs a user into a remote host
rcp Tru64 Copies files on the same host, between a local host and a remote host, and between two remote hosts
rexec Tru64 Allow command execution on a remote host
rexec_r Tru64 Allow command execution on a remote host
on HP-UX execute command on remote host with environment similar to local
t6rhdb_get_host IRIX TSIX Remote Host DataBase get host information
t6rhdb_put_host IRIX TSIX Remote Host DataBase get host information
uuxqt Tru64 Executes remote command requests
Net::Ping IRIX check a remote host for reachability
Copyright © 2004-2005 DeniX Solutions SRL
newsletter delivery service