HP-UX Reference (11i v2 04/09) - 1 User Commands N-Z (vol 2)
r
rlogin(1) rlogin(1)
NAME
rlogin - remote login
SYNOPSIS
rlogin rhost [-7][-8
][-ee][-l username]
rhost [
-7][-8
][-ee][-l username]
In Kerberos V5 Network Authentication Environments
rlogin rhost [-7][-8
][-ee][-f|-F][-k realm][
-l username][-P]
rhost [
-7][-8
][-ee][-f|-F][-k realm][
-l username][-P]
DESCRIPTION
The
rlogin command connects your terminal on the local host to the remote host (rhost).
rlogin acts
as a virtual terminal to the remote system. The host name rhost can be either the official name or an
alias as listed in the file
/etc/hosts (see hosts(4)).
In non-secure or traditional environment,
rlogin allows a user to log in on an equivalent remote host,
rhost, bypassing the normal login/password sequence, in a manner similar to the
remsh command (see
remsh(1)). For more information about equivalent hosts and how to specify them in the files
/etc/hosts.equiv
and .rhosts, see hosts.equiv (4). The searching of the files
/etc/hosts.equiv and
.rhosts occurs on the remote host, and the .rhosts file must be owned by
the remote user account.
If the originating user account is not equivalent to the remote user account, the originating user is
prompted for the password of the remote account. If this fails, a login name and password are prompted
for, as when
login is used (see login(1)).
In a Kerberos V5 Network Authentication environment,
rlogin uses the Kerberos V5 protocol to
authenticate the connection to a remote host. If the authentication is successful, user authorization will
be performed according to the command line options selected for
rlogind (i.e., -K, -R, -r
,or-k). A
password will not be required, so a password prompt will not be seen and a password will not be sent over
the network where it can be observed. For further information on Kerberos authentication and authori-
zation see the Secure Internet Services man page, sis(5) and rlogind(1M).
Although Kerberos authentication and authorization may apply, the Kerberos mechanism is not applied
to the login session. All the information transferred between your host and the remote host is sent in
cleartext over the network.
The terminal type specified by the current
TERM environment variable is propagated across the network
and used to set the initial value of your TERM environment variable on the remote host. Your terminal
baud rate is also propagated to the remote host, and is required by some systems to set up the pseudo-
terminal used by rlogind (see rlogind(1M)).
All echoing takes place at the remote site, so that (except for delays) the remote login is transparent.
If at any time
rlogin is unable to read from or write to the socket connection on the remote host, the
message Connection closed is printed on standard error and rlogin exits.
Options
rlogin recognizes the following options. Note that the options follow the rhost argument.
-7 Set the character size to seven bits. The eighth bit of each byte sent is set to zero
(space parity).
-8 Use an eight-bit data path. This is the default HP-UX behavior.
To use eight-bit characters, the terminal must be configured to generate either
eight-bit characters with no parity, or seven bit characters with space parity. The
HP-UX implementation of
rlogind (see rlogind(1M)) interprets seven bit charac-
ters with even, odd, or mark parity as eight-bit non-USASCII characters. You may
also need to reconfigure the remote host appropriately (see stty (1) and tty(7)).
Some remote hosts may not provide the necessary support for eight-bit characters.
In this case, or if it is not possible to disable parity generation by the local terminal,
use the -7 option.
-ee Set the escape character to e. There is no space separating the option letter and the
argument character. To start a line with the escape character, two of the escape
characters must be entered. The default escape character is tilde (˜). Some
Section 1−−796 Hewlett-Packard Company − 1 − HP-UX 11i Version 2: September 2004