📄 rlogind.8
字号:
.\" Copyright (c) 1983, 1989, 1991, 1993.\" The Regents of the University of California. All rights reserved..\".\" Redistribution and use in source and binary forms, with or without.\" modification, are permitted provided that the following conditions.\" are met:.\" 1. Redistributions of source code must retain the above copyright.\" notice, this list of conditions and the following disclaimer..\" 2. Redistributions in binary form must reproduce the above copyright.\" notice, this list of conditions and the following disclaimer in the.\" documentation and/or other materials provided with the distribution..\" 4. Neither the name of the University nor the names of its contributors.\" may be used to endorse or promote products derived from this software.\" without specific prior written permission..\".\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION).\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF.\" SUCH DAMAGE..\".\" @(#)rlogind.8 8.1 (Berkeley) 6/4/93.\".Dd June 4, 1993.Dt RLOGIND 8.Os BSD 4.2.Sh NAME.Nm rlogind.Nd remote login server.Sh SYNOPSIS.Nm rlogind.Op Fl aln.Sh DESCRIPTION.Nm Rlogindis the server for the.Xr rlogin 1program. The server provides a remote login facilitywith authentication based on privileged port numbers from trusted hosts..PpOptions supported by.Nm rlogind :.Bl -tag -width Ds.It Fl aAsk hostname for verification..It Fl lPrevent any authentication based on the user's.Dq Pa .rhostsfile, unless the user is logging in as the superuser..It Fl nDisable keep-alive messages..El.Pp.Nm Rlogindlistens for service requests at the port indicated inthe ``login'' service specification; see.Xr services 5 .When a service request is received the following protocolis initiated:.Bl -enum.ItThe server checks the client's source port.If the port is not in the range 512-1023, the serveraborts the connection..ItThe server checks the client's source addressand requests the corresponding host name (see.Xr gethostbyaddr 3 ,.Xr hosts 5and.Xr named 8 ) .If the hostname cannot be determined,the dot-notation representation of the host address is used.If the hostname is in the same domain as the server (according tothe last two components of the domain name),or if the.Fl aoption is given,the addresses for the hostname are requested,verifying that the name and address correspond.Normal authentication is bypassed if the address verification fails..El.PpOnce the source port and address have been checked,.Nm rlogindproceeds with the authentication process described in.Xr rshd 8 .It then allocates a pseudo terminal (see.Xr pty 4 ) ,and manipulates file descriptors so that the slavehalf of the pseudo terminal becomes the.Em stdin ,.Em stdout ,and.Em stderrfor a login process.The login process is an instance of the.Xr login 1program, invoked with the.Fl foption if authentication has succeeded.If automatic authentication fails, the user isprompted to log in as if on a standard terminal line..PpThe parent of the login process manipulates the master side ofthe pseudo terminal, operating as an intermediarybetween the login process and the client instance of the.Xr rloginprogram. In normal operation, the packet protocol describedin.Xr pty 4is invoked to provide.Ql ^S/^Qtype facilities and propagateinterrupt signals to the remote programs. The login processpropagates the client terminal's baud rate and terminal type,as found in the environment variable,.Ql Ev TERM ;see.Xr environ 7 .The screen or window size of the terminal is requested from the client,and window size changes from the client are propagated to the pseudo terminal..PpTransport-level keepalive messages are enabled unless the.Fl noption is present.The use of keepalive messages allows sessions to be timed outif the client crashes or becomes unreachable..Sh DIAGNOSTICSAll initial diagnostic messages are indicatedby a leading byte with a value of 1,after which any network connections are closed.If there are no errors before.Xr loginis invoked, a null byte is returned as in indication of success..Bl -tag -width Ds.It Sy Try again.A.Xr forkby the server failed..El.Sh SEE ALSO.Xr login 1 ,.Xr ruserok 3 ,.Xr rshd 8.Sh BUGSThe authentication procedure used here assumes the integrityof each client machine and the connecting medium. This isinsecure, but is useful in an ``open'' environment..PpA facility to allow all data exchanges to be encrypted should bepresent..PpA more extensible protocol should be used..Sh HISTORYThe.Nmcommand appeared in.Bx 4.2 .
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -