HP-UX Reference (11i v3 07/02) - 1 User Commands N-Z (vol 2)

r
rlogin(1) rlogin(1)
NAME
rlogin - remote login
SYNOPSIS
rlogin rhost [-7][-8
][-ee][-l username]
rhost [
-7][-8
][-ee][-l username]
In Kerberos V5 Network Authentication Environments
rlogin rhost [-7][-8
][-ee][-f|-F][-k
realm][-l username][-P]
rhost [
-7][-8
][-ee][-f|-F][-k realm][
-l username][-P]
DESCRIPTION
The
rlogin command connects your terminal on the local host to the remote host (rhost).
rlogin acts
as a virtual terminal to the remote system. The host name rhost can be either the official name or an alias
as listed in the file
/etc/hosts
(see hosts(4)).
In non-secure or traditional environment,
rlogin allows a user to log in on an equivalent remote host,
rhost, bypassing the normal login/password sequence, in a manner similar to the
remsh command (see
remsh(1)). For more information about equivalent hosts and how to specify them in the files
/etc/hosts.equiv and
.rhosts, see hosts.equiv(4). The searching of the files
/etc/hosts.equiv and
.rhosts occurs on the remote host, and the .rhosts file must be owned by
the remote user account.
If the originating user account is not equivalent to the remote user account, the originating user is
prompted for the password of the remote account. If this fails, a login name and password are prompted
for, as when
login is used (see login(1)).
In a Kerberos V5 Network Authentication environment,
rlogin uses the Kerberos V5 protocol to authen-
ticate the connection to a remote host. If the authentication is successful, user authorization will be per-
formed according to the command line options selected for
rlogind (that is, -k, -K
, -r,or-R). A pass-
word will not be required, so a password prompt will not be seen and a password will not be sent over the
network where it can be observed. For further information on Kerberos authentication and authorization
see the Secure Internet Services man page, sis(5) and rlogind(1M).
Although Kerberos authentication and authorization may apply, the Kerberos mechanism is not applied to
the login session. All the information transferred between your host and the remote host is sent in clear-
text over the network.
The terminal type specified by the current
TERM environment variable is propagated across the network
and used to set the initial value of your TERM environment variable on the remote host. Your terminal
baud rate is also propagated to the remote host, and is required by some systems to set up the pseudo-
terminal used by rlogind (see rlogind(1M)).
All echoing takes place at the remote site, so that (except for delays) the remote login is transparent.
If at any time rlogin is unable to read from or write to the socket connection on the remote host, the
message Connection closed is printed on standard error and rlogin exits.
Options
rlogin recognizes the following options. Note that the options follow the rhost argument.
-7 Set the character size to seven bits. The eighth bit of each byte sent is set to zero
(space parity).
-8 Use an eight-bit data path. This is the default HP-UX behavior.
To use eight-bit characters, the terminal must be configured to generate either eight-
bit characters with no parity, or seven bit characters with space parity. The HP-UX
implementation of rlogind (see rlogind(1M)) interprets seven bit characters with
even, odd, or mark parity as eight-bit non-USASCII characters. You may also need to
reconfigure the remote host appropriately (see stty(1) and tty(7)). Some remote hosts
may not provide the necessary support for eight-bit characters. In this case, or if it is
not possible to disable parity generation by the local terminal, use the -7 option.
-ee Set the escape character to e. There is no space separating the option letter and the
argument character. To start a line with the escape character, two of the escape char-
acters must be entered. The default escape character is tilde (˜). Some characters
194 Hewlett-Packard Company 1 HP-UX 11i Version 3: February 2007