| 1 |
|
|---|
| 2 | RSHD(8) BSD System Manager's Manual RSHD(8)
|
|---|
| 3 |
|
|---|
| 4 | NNAAMMEE
|
|---|
| 5 | rrsshhdd -- remote shell server
|
|---|
| 6 |
|
|---|
| 7 | SSYYNNOOPPSSIISS
|
|---|
| 8 | rrsshhdd [--aaiikkllnnvvxxPPLL] [--pp _p_o_r_t]
|
|---|
| 9 |
|
|---|
| 10 | DDEESSCCRRIIPPTTIIOONN
|
|---|
| 11 | rrsshhdd is the server for the rsh(1) program. It provides an authenticated
|
|---|
| 12 | remote command execution service. Supported options are:
|
|---|
| 13 |
|
|---|
| 14 | --nn, ----nnoo--kkeeeeppaalliivvee
|
|---|
| 15 | Disables keep-alive messages. Keep-alives are packets sent at
|
|---|
| 16 | certain intervals to make sure that the client is still there,
|
|---|
| 17 | even when it doesn't send any data.
|
|---|
| 18 |
|
|---|
| 19 | --kk, ----kkeerrbbeerrooss
|
|---|
| 20 | Assume that clients connecting to this server will use some form
|
|---|
| 21 | of Kerberos authentication. See the _E_X_A_M_P_L_E_S section for a sample
|
|---|
| 22 | inetd.conf(5) configuration.
|
|---|
| 23 |
|
|---|
| 24 | --xx, ----eennccrryypptt
|
|---|
| 25 | For Kerberos 4 this means that the connections are encrypted.
|
|---|
| 26 | Kerberos 5 can negotiate encryption even without this option, but
|
|---|
| 27 | if it's present rrsshhdd will deny unencrypted connections. This
|
|---|
| 28 | option implies --kk.
|
|---|
| 29 |
|
|---|
| 30 | --vv, ----vvaaccuuoouuss
|
|---|
| 31 | If the connecting client does not use any Kerberised authentica-
|
|---|
| 32 | tion, print a message that complains about this fact, and exit.
|
|---|
| 33 | This is helpful if you want to move away from old port-based
|
|---|
| 34 | authentication.
|
|---|
| 35 |
|
|---|
| 36 | --PP When using the AFS filesystem, users' authentication tokens are
|
|---|
| 37 | put in something called a PAG (Process Authentication Group).
|
|---|
| 38 | Multiple processes can share a PAG, but normally each login ses-
|
|---|
| 39 | sion has its own PAG. This option disables the sseettppaagg() call, so
|
|---|
| 40 | all tokens will be put in the default (uid-based) PAG, making it
|
|---|
| 41 | possible to share tokens between sessions. This is only useful in
|
|---|
| 42 | peculiar environments, such as some batch systems.
|
|---|
| 43 |
|
|---|
| 44 | --ii, ----nnoo--iinneettdd
|
|---|
| 45 | The --ii option will cause rrsshhdd to create a socket, instead of
|
|---|
| 46 | assuming that its stdin came from inetd(8). This is mostly use-
|
|---|
| 47 | ful for debugging.
|
|---|
| 48 |
|
|---|
| 49 | --pp _p_o_r_t, ----ppoorrtt==_p_o_r_t
|
|---|
| 50 | Port to use with --ii.
|
|---|
| 51 |
|
|---|
| 52 | --aa This flag is for backwards compatibility only.
|
|---|
| 53 |
|
|---|
| 54 | --LL This flag enables logging of connections to syslogd(8). This
|
|---|
| 55 | option is always on in this implementation.
|
|---|
| 56 |
|
|---|
| 57 | FFIILLEESS
|
|---|
| 58 | /etc/hosts.equiv
|
|---|
| 59 | ~/.rhosts
|
|---|
| 60 |
|
|---|
| 61 | EEXXAAMMPPLLEESS
|
|---|
| 62 | The following can be used to enable Kerberised rsh in inetd.cond(5),
|
|---|
| 63 | while disabling non-Kerberised connections:
|
|---|
| 64 |
|
|---|
| 65 | shell stream tcp nowait root /usr/libexec/rshd rshd -v
|
|---|
| 66 | kshell stream tcp nowait root /usr/libexec/rshd rshd -k
|
|---|
| 67 | ekshell stream tcp nowait root /usr/libexec/rshd rshd -kx
|
|---|
| 68 |
|
|---|
| 69 | SSEEEE AALLSSOO
|
|---|
| 70 | rsh(1), iruserok(3)
|
|---|
| 71 |
|
|---|
| 72 | HHIISSTTOORRYY
|
|---|
| 73 | The rrsshhdd command appeared in 4.2BSD.
|
|---|
| 74 |
|
|---|
| 75 | AAUUTTHHOORRSS
|
|---|
| 76 | This implementation of rrsshhdd was written as part of the Heimdal Kerberos 5
|
|---|
| 77 | implementation.
|
|---|
| 78 |
|
|---|
| 79 | HEIMDAL November 22, 2002 HEIMDAL
|
|---|