icon Top 9 categories map      RocketAware >

rlogin(1)

Tips: Browse or Search all pages for efficient awareness of more than 6000 of the most popular reusable and open source applications, functions, libraries, and FAQs.


The "RKT couplings" below include links to source code, updates, additional information, advice, FAQs, and overviews.


Home

Search all pages


Subjects

By activity
Professions, Sciences, Humanities, Business, ...

User Interface
Text-based, GUI, Audio, Video, Keyboards, Mouse, Images,...

Text Strings
Conversions, tests, processing, manipulation,...

Math
Integer, Floating point, Matrix, Statistics, Boolean, ...

Processing
Algorithms, Memory, Process control, Debugging, ...

Stored Data
Data storage, Integrity, Encryption, Compression, ...

Communications
Networks, protocols, Interprocess, Remote, Client Server, ...

Hard World
Timing, Calendar and Clock, Audio, Video, Printer, Controls...

File System
Management, Filtering, File & Directory access, Viewers, ...

    

RocketLink!--> Man page versions: OpenBSD FreeBSD NetBSD RedHat Solaris Others



RLOGIN(1)                  OpenBSD Reference Manual                  RLOGIN(1)

NAME
     rlogin - remote login



SYNOPSIS
     rlogin [-8EKLdx] [-e char] [-k realm] [-l username] host

DESCRIPTION
     rlogin starts a terminal session on a remote host host.

     rlogin first attempts to use the Kerberos authorization mechanism, de-
     scribed below.  If the remote host does not support Kerberos the standard
     Berkeley rhosts authorization mechanism is used.  The options are as fol-
     lows:

     -8    The -8 option allows an eight-bit input data path at all times;
           otherwise parity bits are stripped except when the remote side's
           stop and start characters are other than ^S/^Q .

     -E    The -E option stops any character from being recognized as an es-
           cape character.  When used with the -8 option, this provides a com-
           pletely transparent connection.

     -K    The -K option turns off all Kerberos authentication.

     -L    The -L option allows the rlogin session to be run in ``litout''
           (see tty(4))  mode.

     -d    The -d option turns on socket debugging (see setsockopt(2))  on the
           TCP sockets used for communication with the remote host.

     -e char
           The -e option allows user specification of the escape character,
           which is ``~'' by default.  This specification may be as a literal
           character, or as an octal value in the form \nnn.

     -k realm
           The -k option requests rlogin to obtain tickets for the remote host
           in realm realm instead of the remote host's realm as determined by
           krb_realmofhost(3).

     -x    The -x option turns on DES encryption for all data passed via the
           rlogin session.  This may impact response time and CPU utilization,
           but provides increased security.

     -l username
           The -l option specifies a different username for the remote login.
           If this option is not specified, your local username will be used.

     A line of the form ``<escape char>.'' disconnects from the remote host.
     Similarly, the line ``<escape char>^Z'' will suspend the rlogin session,
     and ``<escape char><delayed-suspend char>'' suspends the send portion of
     the rlogin, but allows output from the remote system.  By default, the
     tilde (``~'') character is the escape character, and normally control-Y
     (``^Y'') is the delayed-suspend character.

     All echoing takes place at the remote site, so that (except for delays)
     the rlogin is transparent.  Flow control via ^S/^Q and flushing of input
     and output on interrupts are handled properly.

KERBEROS AUTHENTICATION
     Each user may have a private authorization list in the file .klogin in
     their home directory.  Each line in this file should contain a Kerberos
     principal name of the form principal.instance@realm. If the originating
     user is authenticated to one of the principals named in .klogin, access
     is granted to the account.  The principal accountname.@localrealm is
     granted access if there is no .klogin file.  Otherwise a login and pass-
     word will be prompted for on the remote machine as in login(1).  To avoid
     certain security problems, the .klogin file must be owned by the remote
     user.

     If Kerberos authentication fails, a warning message is printed and the
     standard Berkeley rlogin is used instead.

ENVIRONMENT
     The following environment variable is utilized by rlogin:

     TERM  Determines the user's terminal type.

SEE ALSO
     rsh(1),  kerberos(3),  krb_realmofhost(3),  krb_sendauth(3)

HISTORY
     The rlogin command appeared in 4.2BSD.

BUGS
     rlogin will be replaced by telnet(1) in the near future.

     More of the environment should be propagated.

OpenBSD 2.6                      June 6, 1993                                2

Source: OpenBSD 2.6 man pages. Copyright: Portions are copyrighted by BERKELEY
SOFTWARE DESIGN, INC., The Regents of the University of California, Massachusetts
Institute of Technology, Free Software Foundation, FreeBSD Inc., and others.



(Corrections, notes, and links courtesy of RocketAware.com)


[Detailed Topics]
FreeBSD Sources for rlogin(1)
OpenBSD sources for rlogin(1)


[Overview Topics]

Up to: Remote Process Creation and Control - Methods of starting and controlling processes remotely. (telnet, login, rexec, et al.)


RocketLink!--> Man page versions: OpenBSD FreeBSD NetBSD RedHat Solaris Others






Rapid-Links: Search | About | Comments | Submit Path: RocketAware > rlogin.1/
RocketAware.com is a service of Mib Software
Copyright 1999, Forrest J. Cavalier III. All Rights Reserved.
We welcome submissions and comments