📄 hosts.equiv.5
字号:
.\" SCCSID: @(#)hosts.equiv.5 8.1 9/11/90.TH hosts.equiv 5.SH Namehosts.equiv \- list of trusted hosts.SH Description.NXR "hosts.equiv file".NXR "host" "listing trusted"The .PN hosts.equivfile resides in the .PN /etcdirectory and contains a list of trusted hosts.When an .MS rlogin 1cor.MS rsh 1crequest from a host listed in the .PN hosts.equivfile is made, and the initiator of the request has an entry in .PN /etc/passwd ,further validity checking is not required.Thus,.PN rlogindoes not prompt for a password, and.PN rshcompletes successfully.When a remote user is in the local .PN hosts.equivfile, that user is defined as equivalenced to a local userwith the same user ID..PPThe format of.PN hosts.equivis a list of names, as in:.nf.I host1.I \-host2.I +@group1.I -@group2.fi.PPA line consisting of a host name means that anyone logging in from that host is trusted.A line consisting of a host name preceded by \fB\-\fPmeans that anyone logging in from that host is not trusted.A line consisting of a single \fB+\fR means that all hosts are trusted. .NTPlacing a line consisting of a single \fB+\fP in your .PN hosts.equivfile poses substantial security risks and is not recommended..NE.PPThe \fB+@\fP and \fB-@\fP syntax are specific to Yellow Pages (YP).A line consisting of.I +@groupmeans that all hosts in that network group (which is served by YP) are trusted.A line consisting of.I \-@groupmeans that hosts in that network group (which is servedby YP) are not trusted. Programs scan the.PN hosts.equivfile sequentially and stop when they encounter the appropriate entry (either positive for host name and +@ entries,or negative for \-@ entries)..PPThe.PN hosts.equivfile has the same format as the.PN .rhostsfile.When a userexecutes.PN rloginor.PN rsh ,the .PN .rhosts file from that user's home directory is concatenated onto the .PN hosts.equivfile for permission checking.The host names listed in the .PN /etc/hosts.equivand .PN \&.rhostsfiles may optionally contain the local BIND domainname. For more information on BIND, see the .I Guide to the BIND/Hesiod Service..NXR "hosts.equiv file" "rhost=>\\&.rhosts file and"If a user is excluded by a minus entry from.PN hosts.equivbut included in .PN .rhosts ,that user is considered trusted.In the special case when the user is root,only the .PN .rhosts file is checked..PPIt is possible to have two entries on a single line.Separate the entires with a space.If the remote host is equivalenced by the first entry,the user named by the second entry is allowed to specify any name to the.PN \-loption (provided that name is in the .PN /etc/passwdfile).For example:.EXsuez john.EEThis entry allows Johnto log in from suez. The normal use would beto put this entry in the .PN .rhostsfile in the home directory for.I bill.Then, Johncan log in as.I billwhen coming from suez without having to supply a password.The second entry can be a netgroup. For example:.EX+@group1 +@group2.EEThis entry allows any user in.I group2coming from a host in.I group1to log in as anyone..SH Files\f(CW/var/yp/\fIdomain\fP/netgroup.br\f(CW/var/yp/\fIdomain\fP/netgroup.byuser.br\f(CW/var/yp/\fIdomain\fP/netgroup.byhost\fR.SH See Alsorlogin(1c), rsh(1c), netgroup(5yp).br.I Guide to the BIND/Hesiod Service.br.I Guide to the Yellow Pages Service
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -