Rlogin
From DrugPedia: A Wikipedia for Drug discovery
(→Some Basic Commands) |
|||
(One intermediate revision not shown.) | |||
Line 1: | Line 1: | ||
- | == rlogin: Remote Login in Unix systems == | + | === rlogin: Remote Login in Unix systems === |
rlogin (remote login) is a Unix command that allows an authorized user to login to other UNIX machines (hosts) on a network and to interact as if the user were physically at the host computer. Once logged in to the host, the user can do anything that the host has given permission for, such as read, edit, or delete files. | rlogin (remote login) is a Unix command that allows an authorized user to login to other UNIX machines (hosts) on a network and to interact as if the user were physically at the host computer. Once logged in to the host, the user can do anything that the host has given permission for, such as read, edit, or delete files. | ||
Line 14: | Line 14: | ||
Protocol Structure - rlogin commandsrlogin [-8EL] [-ec ] [-l username] hostname | Protocol Structure - rlogin commandsrlogin [-8EL] [-ec ] [-l username] hostname | ||
- | -8 | + | '''-8''' |
Allows an 8-bit data path at all times. Otherwise, unless the start and stop characters on the remote host are not Ctrl-S and Ctrl-Q, the rlogincommand uses a 7-bit data path and parity bits are stripped. | Allows an 8-bit data path at all times. Otherwise, unless the start and stop characters on the remote host are not Ctrl-S and Ctrl-Q, the rlogincommand uses a 7-bit data path and parity bits are stripped. | ||
- | -eCharacter | + | '''-eCharacter''' |
Changes the escape character. Substitute the character you choose for Character. | Changes the escape character. Substitute the character you choose for Character. | ||
- | -f | + | '''-f''' |
Causes the credentials to be forwarded. This flag will be ignored if Kerberos 5 is not the current authentication method. Authentication will fail if the current DCE credentials are not marked forwardable. | Causes the credentials to be forwarded. This flag will be ignored if Kerberos 5 is not the current authentication method. Authentication will fail if the current DCE credentials are not marked forwardable. | ||
- | -F | + | '''-F''' |
Causes the credentials to be forwarded. In addition, the credentials on the remote system will be marked forwardable (allowing them to be passed to another remote system). This flag will be ignored if Kerberos 5 is not the current authentication method. Authentication will fail if the current DCE credentials are not marked forwardable. | Causes the credentials to be forwarded. In addition, the credentials on the remote system will be marked forwardable (allowing them to be passed to another remote system). This flag will be ignored if Kerberos 5 is not the current authentication method. Authentication will fail if the current DCE credentials are not marked forwardable. | ||
- | -krealm | + | '''-krealm''' |
Allows the user to specify the realm of the remote station if it is different from the local systems realm. For these purposes, a realm is synonymous with a DCE cell. This flag will be ignored if Kerberos 5 is not the current authentication method. | Allows the user to specify the realm of the remote station if it is different from the local systems realm. For these purposes, a realm is synonymous with a DCE cell. This flag will be ignored if Kerberos 5 is not the current authentication method. | ||
- | -lUser | + | '''-lUser''' |
Changes the remote user name to the one you specify. Otherwise, your local user name is used at the remote host. | Changes the remote user name to the one you specify. Otherwise, your local user name is used at the remote host. |
Current revision
[edit] rlogin: Remote Login in Unix systems
rlogin (remote login) is a Unix command that allows an authorized user to login to other UNIX machines (hosts) on a network and to interact as if the user were physically at the host computer. Once logged in to the host, the user can do anything that the host has given permission for, such as read, edit, or delete files.
Each remote machine may have a file named /etc/hosts.equiv containing a list of trusted host names with which it shares user names. Users with the same username on both the local and remote machine may rlogin from the machines listed in the remote machine's /etc/hosts.equiv file without supplying a password. Individual users may set up a similar private equivalence list with the file .rhosts in their home directories. Each line in this file contains two names: a host- name and a username separated by a space. An entry in a remote user's .rhosts file permits the user named username who is logged into hostname to log in to the remote machine as the remote user without supplying a password. If the name of the local host is not found in the /etc/hosts.equiv file on the remote machine, and the local username and hostname are not found in the remote user's .rhosts file, then the remote machine will prompt for a password. Host names listed in /etc/hosts.equiv and .rhosts files must be the official host names listed in the hosts database; nicknames may not be used in either of these files. For security reasons, the .rhosts file must be owned by either the remote user or by root.
The remote terminal type is the same as your local terminal type (as given in your environment TERM variable). The terminal or window size is also copied to the remote system if the server supports the option, and changes in size are reflected as well. All echoing takes place at the remote site, so that (except for delays) the remote login is transparent. Flow control using <CTRL-S> and <CTRL-Q> and flushing of input and output on interrupts are handled properly.
A secure version of rlogin (slogin) was combined with two other UNIX utility, ssh and scp, in the Secure Shell suite, an interface and protocol created to replace the earlier utilities.
[edit] Some Basic Commands
Protocol Structure - rlogin commandsrlogin [-8EL] [-ec ] [-l username] hostname
-8
Allows an 8-bit data path at all times. Otherwise, unless the start and stop characters on the remote host are not Ctrl-S and Ctrl-Q, the rlogincommand uses a 7-bit data path and parity bits are stripped.
-eCharacter
Changes the escape character. Substitute the character you choose for Character.
-f
Causes the credentials to be forwarded. This flag will be ignored if Kerberos 5 is not the current authentication method. Authentication will fail if the current DCE credentials are not marked forwardable.
-F
Causes the credentials to be forwarded. In addition, the credentials on the remote system will be marked forwardable (allowing them to be passed to another remote system). This flag will be ignored if Kerberos 5 is not the current authentication method. Authentication will fail if the current DCE credentials are not marked forwardable.
-krealm
Allows the user to specify the realm of the remote station if it is different from the local systems realm. For these purposes, a realm is synonymous with a DCE cell. This flag will be ignored if Kerberos 5 is not the current authentication method.
-lUser
Changes the remote user name to the one you specify. Otherwise, your local user name is used at the remote host.