⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 rlogind.texi

📁 压缩包中包含LINUX下多个命令的源码
💻 TEXI
字号:
@node rlogind@chapter rlogind@cindex rlogind@command{rlogind} is the server for the rlogin(1) program.  The serverprovides a remote login facility with authentication based on privileged portnumbers from trusted hosts.@command{Rlogind} listens for service requests at the port indicated in the``login'' service specification; see services(5).  When a service request isreceived the following protocol is initiated:@enumerate@itemThe server checks the client's source port.  If the port is not in the range512-1023, the server aborts the connection.@itemThe server checks the client's source address and requests the correspondinghost name (see gethostbyaddr(3),  hosts(5) and named(8)).  If the hostnamecannot be determined, the dot-notation representation of the host address isused.  If the hostname is in the same domain as the server (according to thelast two components of the domain name), or if the -a option is given, theaddresses for the hostname are requested, verifying that the name and addresscorrespond.  Normal authentication is bypassed if the address verificationfails.@end enumerateOnce the source port and address have been checked, rlogind proceeds withthe authentication process described in rshd(8).  It then allocates apseudo terminal (see pty(4)),  and manipulates file descriptors so thatthe slave half of the pseudo terminal becomes the stdin, stdout, andstderr for a login process.  The login process is an instance of the login(1)program, invoked with the -f option if authentication has succeeded.  Ifautomatic authentication fails, the user is prompted to log in as if on astandard terminal line.The parent of the login process manipulates the master side of the pseudoterminal, operating as an intermediary between the login process and theclient instance of the rlogin program.  In normal operation, the packetprotocol described in pty(4) is invoked to provide `^S/^Q' type facilitiesand propagate interrupt signals to the remote programs.  The loginprocess propagates the client terminal's baud rate and terminal type, asfound in the environment variable, `TERM'; see environ(7).  The screen orwindow size of the terminal is requested from the client, and window sizechanges from the client are propagated to the pseudo terminal.Transport-level keepalive messages are enabled unless the -n option isclient instance of the rlogin program.  In normal operation, the packetprotocol described in pty(4) is invoked to provide `^S/^Q' type facilitiesand propagate interrupt signals to the remote programs.  The loginprocess propagates the client terminal's baud rate and terminal type, asfound in the environment variable, `TERM'; see environ(7).  The screen orwindow size of the terminal is requested from the client, and window sizechanges from the client are propagated to the pseudo terminal.Transport-level keepalive messages are enabled unless the -n option ispresent.  The use of keepalive messages allows sessions to be timed outif the client crashes or becomes unreachable.@xref{ruserok, , ruserok, libc, The GNU C Library Reference Manual}, for details.@section InvokingThe options are as follows :@table @samp@item -a@itemx --verify-hostname@opindex -a@opindex --verify-hostnameAsk hostname for verification.@item -d@itemx --daemon@opindex -d@opindex --daemonDaemon mode.@item -l@itemx --no-rhosts@opindex -l@opindex --no-rhostsIgnore .rhosts file.@item -L@itemx --local-domain=NAME@opindex -L@opindex --local-domainSet local domain name.@item -n@itemx --no-keepalive@opindex -n@opindex --no-keepaliveDo not set SO_KEEPALIVE.@item -k@itemx --kerberos@opindex -k@opindex --kerberosUse kerberos IV authentication.@item -x@itemx --encrypt@opindex -x@opindex --encryptTurns on DES encryption for all data passed via the rlogind session.  This mayimpact response time and CPU utilization, but provides increased security.@item -D@itemx --debug[=LEVEL]@opindex -D@opindex -debugSet debug level, not implemented.@item -h@itemx --help@opindex -h@opindex --helpDisplay usage instructions.@item -V@itemx --version@opindex -V@opindex --versionDisplay program version.@item -o@itemx --allow-root@opindex -o@opindex --allow-rootAllow uid == 0 to login, disable by default\n"@item -p@itemx --port=PORT@opindex -p@opindex --portListen on given port (valid only in daemon mode).@item -r@itemx --reverse-required@opindex -r@opindex --reverse-requiredRequired  Require reverse resolving of a remote host IP.@end table@section DiagnosticsAll initial diagnostic messages are indicated by a leading byte with avalue of 1, after which any network connections are closed.  If there areno errors before login is invoked, a null byte is returned as in indicationof success.@table @samp@item Try again.A fork by the server failed.@end tableThe authentication procedure used here assumes the integrity of eachclient machine and the connecting medium.  This is insecure, but is usefulin an ``open'' environment.

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -