📄 rshd.texi
字号:
@node rshd@chapter rshd@cindex rshdThe @command{rshd} server is the server for the rcmd(3) routine and,consequently, for the rsh(1) program. The server provides remote executionfacilities with authentication based on privileged port numbers from trustedhosts. The @command{rshd} server listens for service requests at the portindicated in the ``cmd'' service specification; see services(5). When aservice request is received the following protocol is initiated:@enumerate@itemThe server checks the client's source port. If the port is not inthe range 512-1023, the server aborts the connection.@itemThe server reads characters from the socket up to a null (`\0')byte. The resultant string is interpreted as an ASCII number, base 10.@itemIf the number received in step 2 is non-zero, it is interpreted asthe port number of a secondary stream to be used for the stderr. Asecond connection is then created to the specified port on theclient's machine. The source port of this second connection is alsoin the range 512-1023.@itemThe server checks the client's source address and requests the correspondinghost name (see gethostbyaddr(3), hosts(5) and named(8)). If the hostnamecannot be determined, the dot-notation representation of the host address isused. If the hostname is in the same domain as the server (according to thelast two components of the domain name), or if the -a option is given, theaddresses for the hostname are requested, verifying that the name and addresscorrespond. If address verification fails, the connection is abortedwith the message, ``Host address mismatch.''@itemA null terminated user name of at most 16 characters is retrieved onthe initial socket. This user name is interpreted as the user identityon the client's machine.@itemA null terminated user name of at most 16 characters is retrieved onthe initial socket. This user name is interpreted as a user identity touse on the server's machine.@itemA null terminated command to be passed to a shell is retrieved onthe initial socket. The length of the command is limited by the upperbound on the size of the system's argument list.@itemRshd then validates the user using ruserok(3), which uses the file/etc/hosts.equiv and the .rhosts file found in the user's home directory.The -l option prevents ruserok(3) from doing any validation based on theuser's ``.rhosts'' file, unless the user is the superuser.@itemIf the file /etc/nologin exists and the user is not the superuser,the connection is closed.@itemA null byte is returned on the initial socket and the command lineis passed to the normal login shell of the user. The shell inheritsthe network connections established by @command{rshd}.@itemTransport-level keepalive messages are enabled unless the -n option ispresent. The use of keepalive messages allows sessions to be timed outif the client crashes or becomes unreachable.@itemThe -L option causes all successful accesses to be logged to syslogd(8)as auth.info messages.@end enumerate@xref{ruserok, , ruserok, libc, The GNU C Library Reference Manual}, for details.@section InvokingThe options are as follows :@table @samp@item -a@itemx --verify-hostname@opindex -a@opindex --verify-hostnameAsk hostname for verification.@c @item -d@c @itemx --daemon@c @opindex -d@c @opindex --daemon@c Daemon mode.@item -l@itemx --no-rhosts@opindex -l@opindex --no-rhostsIgnore .rhosts file.@item -L@itemx --local-domain=NAME@opindex -L@opindex --local-domainSet local domain name.@item -n@itemx --no-keepalive@opindex -n@opindex --no-keepaliveDo not set SO_KEEPALIVE.@item -k@itemx --kerberos@opindex -k@opindex --kerberosUse kerberos IV authentication.@item -x@itemx --encrypt@opindex -x@opindex --encryptTurns on DES encryption for all data passed via the @command{rshd} session.This may impact response time and CPU utilization, but provides increasedsecurity.@item -D@itemx --debug[=LEVEL]@opindex -D@opindex -debugSet debug level, not implemented.@item -h@itemx --help@opindex -h@opindex --helpDisplay usage instructions.@item -V@itemx --version@opindex -V@opindex --versionDisplay program version.@c @item -o@c @itemx --allow-root@c @opindex -o@c @opindex --allow-root@c Allow uid == 0 to login, disable by default\n"@c @item -p@c @itemx --port=PORT@c @opindex -p@c @opindex --port@c Listen on given port (valid only in daemon mode).@c @item -r@c @itemx --reverse-required@c @opindex -r@c @opindex --reverse-required@c Required Require reverse resolving of a remote host IP.@end table@section DiagnosticsExcept for the last one listed below, all diagnostic messages are returnedon the initial socket, after which any network connections are closed. Anerror is indicated by a leading byte with a value of 1 (0 is returned instep 10 above upon successful completion of all the steps prior to theexecution of the login shell).@table @samp@item Locuser too longThe name of the user on the client's machine is longer than 16characters.@item Ruser too longThe name of the user on the remote machine is longer than 16 characters.@item Command too longThe command line passed exceeds the size of the argument list (asconfigured into the system).@item Login incorrectNo password file entry for the user name existed.@item Remote directoryThe chdir command to the home directory failed.@item Permission deniedThe authentication procedure described above failed.@item Can't make pipe.The pipe needed for the stderr, wasn't created.@item Can't fork; try again.A fork by the server failed.@item <shellname>: ...The user's login shell could not be started. This message is re-turned on the connection associated with the stderr, and is notpreceded by a flag byte.@end tableThe authentication procedure used here assumes the integrity of eachclient machine and the connecting medium. This is insecure, but is usefulin an ``open'' environment.
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -