HP-UX Reference (11i v1 00/12) - 1 User Commands N-Z (vol 2)
__________________________________________________________________________________________________________________________________________________________________________________________________
__________________________________________________________________________________________________________________________________________________________________________________________________
STANDARD Printed by: Nora Chuang [nchuang] STANDARD
/build/1111/BRICK/man1/neqn.1
________________________________________________________________
___ ___
r
rlogin(1) Kerberos rlogin(1)
-P Disable Kerberos authentication. Only applicable in a secure environment based on
Kerberos V5. When this option is specified, a password is required and the password
is sent across the network in cleartext. To bypass the normal login/password
sequence, you can login to a remote host using an equivalent account in a manner
similar to remsh. See hosts.equiv(4) for details.
Escape Sequences
rlogin can be controlled with two-character escape sequences, in the form ex, where e is the escape char-
acter and x is a code character described below. Escape sequences are recognized only at the beginning of a
line of input. The default escape character is tilde (˜). It can be changed with the -e option.
The following escape sequences are recognized:
ey If y is NOT a code character described below, pass the escape character and y as characters to
the remote host.
ee Pass the escape character as a character to the remote host.
e. Disconnect from the remote host.
e! Escape to a subshell on the local host. Use
exit to return to the remote host.
If
rlogin is run from a shell that supports job control (see csh(1), ksh(1), and sh-posix(1)), escape
sequences can be used to suspend
rlogin. The following escape sequences assume that ˆZ and ˆY
are set as the user’s susp and dsusp characters, respectively (see stty(1) and termio(7)).
e
ˆZ Suspend the rlogin session and return the user to the shell that invoked rlogin. The
rlo-
gin
job can be resumed with the fg command (see csh(1), ksh(1), and sh-posix(1)). e
ˆZ
suspends both rlogin processes: the one transmitting user input to the remote login, and the
one displaying output from the remote login.
eˆY Suspend the rlogin session and return the user to the shell that invoked rlogin. The
rlo-
gin
job can be resumed with the fg command (see csh(1), ksh(1), and sh-posix(1)). e
ˆY
suspends only the input process; output from the remote login continues to be displayed.
If you "daisy-chain" remote logins (for example, you
rlogin from host A to host B and then rlogin from
host B to host C) without setting unique escape characters, you can repeat the escape character until it
reaches your chosen destination. For example, the first escape character, e, is seen as an escape character
on host A; the second e is passed as a normal character by host A and seen as an escape character on host
B; a third e is passed as a normal character by hosts A and B and accepted as a normal character by host C.
Remote Host Name As Command
The system administrator can arrange for more convenient access to a remote host (rhost) by linking
remsh to /usr/hosts/ rhost, allowing use of the remote host name (rhost) as a command (see
remsh(1)). For example, if
remotehost is the name of a remote host and /usr/hosts/remotehost
is linked to remsh, and if /usr/hosts is in your search path, the command:
remotehost
is equivalent to:
rlogin remotehost
RETURN VALUES
rlogin sends an error message to standard error and returns a nonzero value if an error occurs before
the connection to the remote host is completed. Otherwise, it returns a zero.
DIAGNOSTICS
Diagnostics can occur from both the local and remote hosts. Those that occur on the local host before the
connection is completely established are written to standard error. Once the connection is established, any
error messages from the remote host are written to standard output, like any other data.
Error! could not retrieve authentication type.
Please notify sys admin.
There are two authentication mechanisms used by rlogin. One authentication mechanism is based
on Kerberos and the other is not. The type of authentication mechanism is obtained from a system
file which is updated by inetsvcs_sec (see inetsvcs_sec(1M)). If the system file does not contain
known authentication types, the above error is displayed.
Section 1−−794 − 2 − HP-UX Release 11i: December 2000
___
___