I have a doubt regarding the usage of "rsh".
what are all the things to be set before using it.When I use this I am getting "permission denied" error.
there are 2 kind of files for secure control(actually they only control the access) of r-command:
/etc/hosts.equiv
$HOME/.rhosts
both kind of files have the same format,trusted hosts or trusted users on the hosts are list in the files per line looks like below:
hosta
hostb user1 user2
+
"+" means all users on all hosts are trusted
root user dosen't use the file /etc/hosts.equiv
ordinary users use /etc/hosts.equiv 1st,if not authenticated,then $HOME/.rhosts
In addition, if you are using hostnames in these files you need to get them exactly right - they must match the remote client name in /etc/hosts or the Fully qualified name if you are using DNS for name resolution. Try telnetting from the calling client to the server and calling 'who am i' to find out what name to use.
This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
By continuing to use this site, you are consenting to our use of cookies.