Tek-Tips is the largest IT community on the Internet today!

Members share and learn making Tek-Tips Forums the best source of peer-reviewed technical information on the Internet!

  • Congratulations Mike Lewis on being selected by the Tek-Tips community for having the most helpful posts in the forums last week. Way to Go!

Usage of rsh

Status
Not open for further replies.

jomons

Technical User
Dec 16, 2002
16
0
0
IN
Hi..

I have a doubt regarding the usage of "rsh".
what are all the things to be set before using it.When I use this I am getting "permission denied" error.


Pls Help....

Regards

Joe
 
there are 2 kind of files for secure control(actually they only control the access) of r-command:
/etc/hosts.equiv
$HOME/.rhosts

both kind of files have the same format,trusted hosts or trusted users on the hosts are list in the files per line looks like below:
hosta
hostb user1 user2
+
"+" means all users on all hosts are trusted

root user dosen't use the file /etc/hosts.equiv
ordinary users use /etc/hosts.equiv 1st,if not authenticated,then $HOME/.rhosts


 
In addition, if you are using hostnames in these files you need to get them exactly right - they must match the remote client name in /etc/hosts or the Fully qualified name if you are using DNS for name resolution. Try telnetting from the calling client to the server and calling 'who am i' to find out what name to use.
 
I find that the host names have to be in /etc/hosts regardless of DNS for rsh authentication. Annihilannic.
 
Status
Not open for further replies.

Part and Inventory Search

Sponsor

Back
Top