Installing and Administering Internet Services
Chapter 10 409
Using rdist
Setting Up remsh
Setting Up remsh
rdist uses remsh as the mechanism for distributing files over the
network. In order to use rdist, you must set up remsh on each of the
remote hosts. Follow these steps:
1. On each of the remote hosts, create an entry for the master host in
the $HOME/.rhosts file of the user who will run rdist. For example,
if rdist will always be run by user root, create an entry for the
master host in root’s .rhosts file (/.rhosts) on each of the remote
hosts.
2. On each of the remote hosts, make sure following line is
uncommented in the /etc/inetd.conf file. (Make sure it is not
preceded by #.)
shell stream tcp nowait root /usr/lbin/remshd remshd
3. On each of the remote hosts, issue the following command to force
inetd to reread its configuration file:
/usr/sbin/inetd -c
Authentication for remsh and rexec Services
Pluggable Authenticaion Modules (PAM) for authentication is supported
on HP-UX. PAM support enables users who are not listed in
/etc/passwd file to use the rexec and remsh services. It also enbles you
to use authentication methods other than the standard UNIX
authentication. DCE integrated login and Kerberos are authentication
mechanisms you can use in addition to standard UNIX authentication.
The rexecd and remshd services will use the authentication mechanism
specified in “OTHER” directive of the /etc/pam.conf file. To use other
authentication methods, you must edit the /etc/pam.conf file.
The Pluggable Authentication Module Configuration File
The /etc/pam.conf file is the configuration file for the Pluggable
Authentication Module architecture (PAM). The pam.conf file contains a
list of services. Each service is paired with a corresponding service
module. When a service is requested, its associated module is invoked.
Each entry in the /etc/pam.conf file has the following format: