⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 rshd.8

📁 linux下常用的网络工具的代码
💻 8
字号:
.\" Copyright (c) 1983, 1989, 1991, 1993.\"	The Regents of the University of California.  All rights reserved..\".\" Redistribution and use in source and binary forms, with or without.\" modification, are permitted provided that the following conditions.\" are met:.\" 1. Redistributions of source code must retain the above copyright.\"    notice, this list of conditions and the following disclaimer..\" 2. Redistributions in binary form must reproduce the above copyright.\"    notice, this list of conditions and the following disclaimer in the.\"    documentation and/or other materials provided with the distribution..\" 4. Neither the name of the University nor the names of its contributors.\"    may be used to endorse or promote products derived from this software.\"    without specific prior written permission..\".\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.\" ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION).\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF.\" SUCH DAMAGE..\".\"     @(#)rshd.8	8.1 (Berkeley) 6/4/93.\".Dd June 4, 1993.Dt RSHD 8.Os BSD 4.2.Sh NAME.Nm rshd.Nd remote shell server.Sh SYNOPSIS.Nm rshd.Op Fl alnL.Sh DESCRIPTIONThe.Nm rshdserveris the server for the.Xr rcmd 3routine and, consequently, for the.Xr rsh 1program.  The server provides remote execution facilitieswith authentication based on privileged port numbers from trusted hosts..PpThe.Nm rshdserverlistens for service requests at the port indicated inthe ``cmd'' service specification; see.Xr services 5 .When a service request is received the following protocolis initiated:.Bl -enum.ItThe server checks the client's source port.If the port is not in the range 512-1023, the serveraborts the connection..ItThe server reads characters from the socket upto a null (`\e0') byte.  The resultant string isinterpreted as an.Tn ASCIInumber, base 10..ItIf the number received in step 2 is non-zero,it is interpreted as the port number of a secondarystream to be used for the.Em stderr .A second connection is then created to the specifiedport on the client's machine.  The source port of thissecond connection is also in the range 512-1023..ItThe server checks the client's source addressand requests the corresponding host name (see.Xr gethostbyaddr 3 ,.Xr hosts 5and.Xr named 8 ) .If the hostname cannot be determined,the dot-notation representation of the host address is used.If the hostname is in the same domain as the server (according tothe last two components of the domain name),or if the.Fl aoption is given,the addresses for the hostname are requested,verifying that the name and address correspond.If address verification fails, the connection is abortedwith the message, ``Host address mismatch.''.ItA null terminated user name of at most 16 charactersis retrieved on the initial socket.  This user nameis interpreted as the user identity on the.Em client Ns 'smachine..ItA null terminated user name of at most 16 charactersis retrieved on the initial socket.  This user nameis interpreted as a user identity to use on the.Sy server Ns 'smachine..ItA null terminated command to be passed to ashell is retrieved on the initial socket.  The length ofthe command is limited by the upper bound on the size ofthe system's argument list..It.Nm Rshdthen validates the user using.Xr ruserok 3 ,which uses the file.Pa /etc/hosts.equivand the.Pa .rhostsfile found in the user's home directory.  The.Fl loption prevents.Xr ruserok 3from doing any validation based on the user's ``.rhosts'' file,unless the user is the superuser..ItIf the file.Pa /etc/nologinexists and the user is not the superuser,the connection is closed..ItA null byte is returned on the initial socketand the command line is passed to the normal loginshell of the user.  Theshell inherits the network connections establishedby.Nm rshd ..El.PpTransport-level keepalive messages are enabled unless the.Fl noption is present.The use of keepalive messages allows sessions to be timed outif the client crashes or becomes unreachable..PpThe.Fl Loption causes all successful accesses to be logged to.Xr syslogd 8as.Li auth.infomessages..Sh DIAGNOSTICSExcept for the last one listed below,all diagnostic messagesare returned on the initial socket,after which any network connections are closed.An error is indicated by a leading byte with a value of1 (0 is returned in step 10 above upon successful completionof all the steps prior to the execution of the login shell)..Bl -tag -width indent.It Sy Locuser too long.The name of the user on the client's machine islonger than 16 characters..It Sy Ruser too long.The name of the user on the remote machine islonger than 16 characters..It Sy Command too long  .The command line passed exceeds the size of the argumentlist (as configured into the system)..It Sy Login incorrect.No password file entry for the user name existed..It Sy Remote directory.The.Xr chdircommand to the home directory failed..It Sy Permission denied.The authentication procedure described above failed..It Sy Can't make pipe.The pipe needed for the.Em stderr ,wasn't created..It Sy Can't fork; try again.A.Xr forkby the server failed..It Sy <shellname>: ...The user's login shell could not be started.  This message is returnedon the connection associated with the.Em stderr ,and is not preceded by a flag byte..El.Sh SEE ALSO.Xr rsh 1 ,.Xr rcmd 3 ,.Xr ruserok 3.Sh BUGSThe authentication procedure used here assumes the integrityof each client machine and the connecting medium.  This isinsecure, but is useful in an ``open'' environment..PpA facility to allow all data exchanges to be encrypted should bepresent..PpA more extensible protocol (such as Telnet) should be used.

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -