HP-UX Reference (11i v1 05/09) - 1M System Administration Commands N-Z (vol 4)
r
rlogind(1M) rlogind(1M)
EXTERNAL INFLUENCES
International Code Set Support
Single- and multibyte character code sets are supported.
DIAGNOSTICS
Errors in establishing a connection cause an error message to be returned with a leading byte of 1 through
the socket connection, after which the network connection is closed. Any errors generated by the login pro-
cess or its descendents are passed through by the server as normal communication.
fork: No more processes
The server was unable to fork a process to handle the incoming connection.
Next step: Wait a period of time and try again. If this message persists, the server’s host may
have runaway processes that are using all the entries in the process table.
Cannot allocate pty on remote host
The server was unable to obtain a pseudo-terminal for use with the login process. Either all
pseudo-terminals were in use, or the pty driver has not been properly set up. Note that the
number of slave devices that can be allocated depends on NSTRPTY, a kernel tunable parameter.
This can be changed via SAM ( see ptm(7), pts(7)).
Next step: Check the pty configuration of the host where rlogind executes.
Permission denied
The server denied access because the client was not using a reserved port. This should only hap-
pen to interlopers trying to break into the system.
/usr/bin/login: ...
The login program could not be started via exec(2) for the reason indicated.
Next step: Try to correct the condition causing the problem. If this message persists, contact
your system administrator.
rcmd: connect : <hostname>: Connection refused.
This generic message could be due to a number of reasons. One of the reasons could be because
the entry for login service is not present in /etc/inetd.conf
. This entry may have been
removed or commented out to prevent non-secure access.
Kerberos specific errors are listed in sis(5).
WARNINGS
The integrity of each host and the connecting medium is assumed if the "privileged port" authentication
procedure is used in a non-secure environment or if the command line options
-R or -r are used in a
secure environment. Although both these methods provide insecure access, they are useful in an "open"
environment. This is insecure, but is useful in an ‘‘open’’ environment.
Note that all the information, including any passwords, are passed unencrypted between the two hosts
when
rlogind is invoked in a non-secure environment.
AUTHOR
rlogind was developed by the University of California, Berkeley.
FILES
/etc/hosts.equiv List of equivalent hosts
$HOME/.rhosts User’s private equivalence list
SEE ALSO
login(1), rlogin(1), inetd(1M), named(1M), gethostent(3N), ruserok(3N), hosts(4), hosts.equiv(4),
inetd.conf(4), services(4), environ(5), pty(7), sis(5).
HP-UX 11i Version 1: September 2005 − 3 − Hewlett-Packard Company Section 1M−−761