HP-UX Reference (11i v2 07/12) - 1 User Commands N-Z (vol 2)

r
rlogin(1) rlogin(1)
remsh(1)). For example, if
remotehost is the name of a remote host and /usr/hosts/remotehost
is linked to remsh, and if /usr/hosts
is in your search path, the command:
remotehost
is equivalent to:
rlogin remotehost
RETURN VALUE
rlogin sends an error message to standard error and returns a nonzero value if an error occurs before
the connection to the remote host is completed. Otherwise, it returns a zero.
DIAGNOSTICS
Diagnostics can occur from both the local and remote hosts. Those diagnostics that occur on the local host
before the connection is completely established are written to standard error. Once the connection is esta-
blished, any error messages from the remote host are written to standard output, like any other data.
Error! could not retrieve authentication type.
Please notify sys admin.
There are two authentication mechanisms used by
rlogin. One authentication mechanism is based
on Kerberos and the other is not. The type of authentication mechanism is obtained from a system
file which is updated by
inetsvcs_sec (see inetsvcs_sec(1M)). If the system file does not contain
known authentication types, the above error is displayed.
login/tcp: Unknown service
rlogin
was unable to find the login service listed in the /etc/services
database file.
There is no entry for you (user ID username) in /etc/passwd
rlogin
was unable to find your user ID in the password file.
Next Step: Contact your system administrator.
system call:...
An error occurred when rlogin attempted the indicated system call. See the appropriate manual
entry for information about the error.
EXAMPLES
Log in as the same user on the remote host remote:
rlogin remote
Set the escape character to a !, use a seven-bit data connection, and attempt a login as user
guest on
host
remhost:
rlogin remhost -e! -7 -l guest
Assuming that your system administrator has set up the links in
/usr/hosts , the following is equivalent
to the previous command:
remhost -e! -7 -l guest
WARNINGS
For security purposes, the /etc/hosts.equiv and .rhosts files should exist, even if they are empty.
These files should be readable and writable only by the owner. See hosts.equiv(4) for more information.
Note that all the information, including any passwords asked for, is passed unencrypted between the two
hosts. In a Kerberos V5 Network Authentication environment, a password is not transmitted across the
network, so it will be protected.
rlogin is unable to transmit the Break key as an interrupt signal to the remote system, regardless of
whether the user has set stty brkint on the local system. The key assigned to SIGINT with the com-
mand stty intr c should be used instead (see stty(1)).
AUTHOR
rlogin was developed by the University of California, Berkeley.
218 Hewlett-Packard Company 3 HP-UX 11i Version 2: December 2007 Update