HP-UX Reference (11i v1 05/09) - 1 User Commands N-Z (vol 2)
r
rlogin(1) rlogin(1)
remhost -e! -7 -l guest
WARNINGS
For security purposes, the /etc/hosts.equiv
and .rhosts files should exist, even if they are empty.
These files should be readable and writable only by the owner. See hosts.equiv(4) for more information.
Note that all the information, including any passwords asked for, is passed unencrypted between the two
hosts. In a Kerberos V5 Network Authentication environment, a password is not transmitted across the
network, so it will be protected.
rlogin is unable to transmit the Break key as an interrupt signal to the remote system, regardless of
whether the user has set stty brkint on the local system. The key assigned to
SIGINT with the com-
mand
stty intr c should be used instead (see stty(1)).
AUTHOR
rlogin was developed by the University of California, Berkeley.
FILES
$HOME/.rhosts User’s private equivalence list
/etc/hosts.equiv
List of equivalent hosts
/usr/hosts/* For rhost version of the command
SEE ALSO
csh(1), ksh(1), login(1), remsh(1), sh(1), sh-bourne(1), sh-posix(1), stty(1), telnet(1), rlogind(1M),
inetsvcs_sec(1M), hosts(4), hosts.equiv(4), inetd.conf(4), krb5.conf(4), services(4), sis(5), termio(7), tty(7).
HP-UX 11i Version 1: September 2005 − 4 − Hewlett-Packard Company Section 1−−837