Next: talkd
: a server for communication between users, Previous: rlogind
: Remote login server, Up: GNU Inetutils [Contents][Index]
rshd
: Remote shell serverThe rshd
server is the server for the rcmd
routine
and, consequently, for the rsh
(see rsh
: Remote shell)
program. The server provides remote execution facilities with
authentication based on privileged port numbers from trusted hosts.
The rshd
server listens for service requests at the port
indicated in the ‘cmd’ service specification. When a service
request is received the following protocol is initiated:
ruserok
, which uses the file
/etc/hosts.equiv and the .rhosts file found in the
user’s home directory. The -l option prevents ruserok
from doing any validation based on the user’s .rhosts file,
unless the user is the superuser.
rshd
.
syslogd
(see syslogd
: system service logging faclity) as ‘auth.info’
messages.
See ruserok in The GNU C Library Reference Manual, for details.
The options are as follows:
Ask hostname for verification.
Use Kerberos authentication.
Ignore .rhosts file.
Log successful logins.
Do not set SO_KEEPALIVE.
Set Kerberos server name, overriding canonical hostname.
Fail any call asking for non-Kerberos authentication.
Demand that the client’s IP address be resolvable as a host name.
Should rshd
have been built with PAM support,
it reads any setting specified for a service named either
‘rsh’ or ‘krsh’, the latter name for clients
seeking Kerberised authentication.
Except for the last one listed below, all diagnostic messages are returned on the initial socket, after which any network connections are closed. An error is indicated by a leading byte with a value of 1 (0 is returned in step 10 above upon successful completion of all the steps prior to the execution of the login shell).
The name of the user on the client’s machine is longer than 16 characters.
The name of the user on the remote machine is longer than 16 characters.
The command line passed exceeds the size of the argument list (as configured into the system).
No password file entry for the user name existed.
The chdir command to the home directory failed.
The authentication procedure described above failed, or address resolution was insufficient.
The pipe needed for the stderr, wasn’t created.
A fork by the server failed.
The user’s login shell could not be started. This message is returned on the connection associated with the stderr, and is not preceded by a flag byte.
The authentication procedure used here assumes the integrity of each client machine and the connecting medium. This is insecure, but is useful in an “open” environment.
Next: talkd
: a server for communication between users, Previous: rlogind
: Remote login server, Up: GNU Inetutils [Contents][Index]