RLOGIN(1) User Commands RLOGIN(1)

NAME


rlogin - remote login

SYNOPSIS


rlogin [-8EL] [-ec ] [-A] [-K] [-x] [-PN | -PO] [-f | -F] [-a]
[-l username] [-k realm] hostname


DESCRIPTION


The rlogin utility establishes a remote login session from your
terminal to the remote machine named hostname. The user can choose to
kerberize the rlogin session using Kerberos V5 and also protect the
data being transferred.


Hostnames are listed in the hosts database, which can be contained in
the /etc/hosts file, the Network Information Service (NIS) hosts map,
the Internet domain name server, or a combination of these. Each host
has one official name (the first name in the database entry), and
optionally one or more nicknames. Either official hostnames or
nicknames can be specified in hostname.


The user can opt for a secure rlogin session which uses Kerberos V5
for authentication. Encryption of the session data is also possible.
The rlogin session can be kerberized using any of the following
Kerberos specific options: -A, -PN or -PO, -x, -f or -F, and -k
realm. Some of these options (-A, -x, -PN or -PO, and -f or -F) can
also be specified in the [appdefaults] section of krb5.conf(5). The
usage of these options and the expected behavior is discussed in the
OPTIONS section below. If Kerberos authentication is used,
authorization to the account is controlled through rules in
krb5_auth_rules(7). If this authorization fails, fallback to normal
rlogin using rhosts occurs only if the -PO option is used explicitly
on the command line or is specified in krb5.conf(5). Also notice that
the -PN or -PO, -x, -f or -F, and -k realm options are just supersets
of the -A option.


The remote terminal type is the same as your local terminal type, as
given in your environment TERM variable. The terminal or window size
is also copied to the remote system if the server supports the
option. Changes in size are reflected as well. All echoing takes
place at the remote site, so that (except for delays) the remote
login is transparent. Flow control using Control-S and Control-Q and
flushing of input and output on interrupts are handled properly.

OPTIONS


The following options are supported:

-8
Passes eight-bit data across the net instead of seven-
bit data.


-a
Forces the remote machine to ask for a password by
sending a null local username.


-A
Explicitly enables Kerberos authentication and trusts
the .k5login file for access-control. If the
authorization check by in.rlogind(8) on the server-
side succeeds and if the .k5login file permits access,
the user is allowed to login without supplying a
password.


-ec
Specifies a different escape character, c, for the
line used to disconnect from the remote host.


-E
Stops any character from being recognized as an escape
character.


-f
Forwards a copy of the local credentials (Kerberos
Ticket Granting Ticket) to the remote system. This is
a non-forwardable ticket granting ticket. You must
forward a ticket granting ticket if you need to
authenticate yourself to other Kerberized network
services on the remote host. An example is if your
home directory on the remote host is NFS mounted via
Kerberos V5. If your local credentials are not
forwarded in this case, you can not access your home
directory. This option is mutually exclusive with the
-F option.


-F
Forwards a forwardable copy of the local credentials
(Kerberos Ticket Granting Ticket) to the remote
system. The -F option provides a superset of the
functionality offered by the -f option. For example,
with the -f option, after you connected to the remote
host, any attempt to invoke /usr/bin/ftp,
/usr/bin/telnet, /usr/bin/rlogin, or /usr/bin/rsh with
the -f or -F options would fail. Thus, you would be
unable to push your single network sign on trust
beyond one system. This option is mutually exclusive
with the -f option.


-k realm
Causes rlogin to obtain tickets for the remote host in
realm instead of the remote host's realm as determined
by krb5.conf(5).


-K
This option explicitly disables Kerberos
authentication. It can be used to override the
autologin variable in krb5.conf(5).


-l username
Specifies a different username for the remote login.
If you do not use this option, the remote username
used is the same as your local username.


-L
Allows the rlogin session to be run in "litout" mode.


-PN
-PO
Explicitly requests the new (-PN) or old (-PO) version
of the Kerberos `rcmd' protocol. The new protocol
avoids many security problems prevalent in the old one
and is considered much more secure, but is not
interoperable with older (MIT/SEAM) servers. The new
protocol is used by default, unless explicitly
specified using these options or by using
krb5.conf(5). If Kerberos authorization fails when
using the old `rcmd' protocol, there is fallback to
regular, non-kerberized rlogin. This is not the case
when the new, more secure `rcmd' protocol is used.


-x
Turns on DES encryption for all data passed through
the rlogin session. This reduces response time and
increases CPU utilization.


Escape Sequences


Lines that you type which start with the tilde character (~) are
"escape sequences." The escape character can be changed using the -e
option.

~.
Disconnects from the remote host. This is not the same as a
logout, because the local host breaks the connection with
no warning to the remote end.


~susp
Suspends the login session, but only if you are using a
shell with Job Control. susp is your "suspend" character,
usually Control-Z. See tty(1).


~dsusp
Suspends the input half of the login, but output is still
able to be seen (only if you are using a shell with Job
Control). dsusp is your "deferred suspend" character,
usually Control-Y. See tty(1).


OPERANDS


hostname
The remote machine on which rlogin establishes the remote
login session.


USAGE


For the kerberized rlogin session, each user can have a private
authorization list in a file, .k5login, in his home directory. Each
line in this file should contain a Kerberos principal name of the
form principal/instance@realm. If there is a ~/.k5login file, access
is granted to the account if and only if the originating user is
authenticated to one of the principals named in the ~/.k5login file.
Otherwise, the originating user is granted access to the account if
and only if the authenticated principal name of the user can be
mapped to the local account name using the authenticated-principal-
name -> local-user-name mapping rules. The .k5login file (for access
control) comes into play only when Kerberos authentication is being
done.


For the non-secure rlogin session, each remote machine can have a
file named /etc/hosts.equiv containing a list of trusted host names
with which it shares user names. Users with the same user name on
both the local and remote machine can rlogin from the machines listed
in the remote machine's /etc/hosts.equiv file without supplying a
password. Individual users may set up a similar private equivalence
list with the file .rhosts in their home directories. Each line in
this file contains two names, that is, a host name and a user name,
separated by a space. An entry in a remote user's .rhosts file
permits the user named username who is logged into hostname to log in
to the remote machine as the remote user without supplying a
password. If the name of the local host is not found in the
/etc/hosts.equiv file on the remote machine, and the local user name
and host name are not found in the remote user's .rhosts file, then
the remote machine prompts for a password. Host names listed in the
/etc/hosts.equiv and .rhosts files must be the official host names
listed in the hosts database. Nicknames can not be used in either of
these files.


For security reasons, the .rhosts file must be owned by either the
remote user or by root.

FILES


/etc/passwd
Contains information about users' accounts.


/usr/hosts/*
For hostname version of the command.


/etc/hosts.equiv
List of trusted hostnames with shared user
names.


/etc/nologin
Message displayed to users attempting to login
during machine shutdown.


$HOME/.rhosts
Private list of trusted hostname/username
combinations.


$HOME/.k5login
File containing Kerberos principals that are
allowed access.


/etc/krb5/krb5.conf
Kerberos configuration file.


/etc/hosts
Hosts database.


SEE ALSO


rsh(1), stty(1), tty(1), hosts(5), hosts.equiv(5), krb5.conf(5),
nologin(5), attributes(7), krb5_auth_rules(7), in.rlogind(8)

DIAGNOSTICS


The following message indicates that the machine is in the process of
being shut down and logins have been disabled:

NO LOGINS: System going down in N minutes


NOTES


When a system is listed in hosts.equiv, its security must be as good
as local security. One insecure system listed in hosts.equiv can
compromise the security of the entire system.


The Network Information Service (NIS) was formerly known as Sun
Yellow Pages (YP.) The functionality of the two remains the same.
Only the name has changed.


This implementation can only use the TCP network service.

September 12, 2020 RLOGIN(1)

tribblix@gmail.com :: GitHub :: Privacy