2698:
2720:
600:
standards for Unix operating systems. With wider public adoption of the
Internet, their inherent security vulnerabilities became a problem, and beginning with the development of
1329:
463:
1027:
can copy a file or directory from the local system to a remote system, from a remote system to the local system, or from one remote system to another. The command line
1128:
requests a status report from all computers on the local network. It then returns the uptime report. If a computer did not respond within the time limit, then
223:
842:
This allows all users from host1 to login, user_a from host2 to login, no users from host3, all users on group1 except user_b, and no users on group2.
1183:, but their reliance on remote usernames, hostnames, and IP addresses is exploitable. For this reason many corporate system administrators prohibit
2086:
896:
protocol suite. Authenticated users can act as if they were physically present at the computer. RFC 1282, in which it was defined, states: "The
2756:
1194:
client to provide information honestly, including source port and source host name. A malicious client can forge this and gain access, as the
1710:
1944:
1925:
1894:
1839:
1378:
1343:
1294:
456:
183:
313:
308:
278:
138:
778:
Client: <null> usernameontheclient<null> usernameontheserver<null> terminaltype/terminalbaudrate<null> Server:
516:
385:
328:
253:
45:
810:(applies to only the user that puts the file in its home folder) access-control scheme, although they connect to different daemons.
1660:
1419:
395:
365:
1515:
1028:
449:
380:
173:
2711:
2706:
512:
41:
542:
198:
188:
1097:, maintains a database of the status of Unix systems on the local network. The daemon and its database are also used by the
1202:
the client is running on a trusted machine. It also cannot check if the requesting client on a trusted machine is the real
873:
318:
298:
248:
1963:
238:
233:
228:
2751:
2746:
2079:
1471:
415:
375:
243:
782:
The server would check that the user should have access. If so, it returns a message with nothing in it (not even a
2055:
905:
642:
620:
2683:
2653:
2034:
1621:
2668:
604:
protocols and applications in 1995, its adoption entirely supplanted the deployment and use of r-commands (and
268:
208:
1597:
900:
facility provides a remote-echoed, locally flow-controlled virtual terminal with proper flushing of output."
889:
435:
425:
218:
133:
117:
2724:
2429:
2098:
2072:
2064:
1543:
1450:
1321:
946:
303:
153:
1262:
1168:
All information, including passwords, is transmitted unencrypted (making it vulnerable to interception).
558:
430:
203:
1913:
2599:
2547:
1918:
Enterprise
Security: Solaris Operating Environment, Security Journal, Solaris OE v2.51, 2.6, 7, and 8
1407:
1008:) requires login: it authenticates users by reading the username and password (unencrypted) from the
213:
1455:
945:
procedure. Once connected, the user can execute commands on the remote computer through the shell's
1718:
1214:
497:
91:
86:
771:(remote-shell, allowing commands to be run on a remote machine without the user logging into it).
2272:
2262:
2049:
1490:
1472:"How and Why More Secure Technologies Succeed in Legacy Markets: Lessons from the Success of SSH"
1000:
enables the user to run shell commands on a remote computer. However, unlike the rsh server, the
977:
865:
637:
625:
420:
148:
1325:
1516:"REXEC command—Execute a command on the remote host and receive the results on your local host"
1950:
1940:
1921:
1890:
1882:
1835:
1656:
1646:
1570:
1425:
1415:
1394:
1374:
1366:
1339:
1290:
1282:
938:
886:
574:
348:
124:
2499:
2404:
2399:
1999:
1981:
1739:
1482:
970:
954:
869:
538:
508:
485:
101:
70:
1233:
distributions no longer including them by default). Many networks that formerly relied on
790:
Client: <null> bostic<null> kbostic<null> vt100/9600<null> Server:
2678:
2622:
2527:
2328:
2231:
1717:. Stanford University School of Earth, Energy & Environmental Sciences. Archived from
962:
958:
289:
1806:
1061:, it provides no mechanism for warning the user before overwriting the target file. Like
2028:
2617:
2552:
2537:
2474:
2434:
2313:
2277:
2171:
1786:
1335:
1199:
1009:
966:
783:
524:
481:
339:
94:
1763:
2740:
2658:
2519:
2454:
2226:
2201:
2102:
1494:
1229:
Due to these problems, the r-commands fell into relative disuse (with many Unix and
920:
command, but is not as customizable and is able to connect only to Unix-like hosts.
2632:
2532:
2449:
2444:
2348:
2257:
2221:
2176:
1242:
929:
876:
768:
601:
550:
258:
106:
545:(BSD). The r-commands premiered in BSD v4.1. Among the programs in the suite are:
2568:
2542:
2479:
2469:
2459:
2424:
2414:
2409:
2292:
2282:
2236:
2003:
1206:
client, meaning that malicious programs may pretend to be a standard-conforming
2384:
2343:
2146:
2116:
1970:
1326:"Twenty Years of Berkeley Unix: From AT&T-Owned to Freely Redistributable"
1124:
command shows how long a Unix system has been running since the last restart,
1086:
1078:
590:
406:
36:
1645:
Edwards, Wade; Lancaster, Tom; Quinn, Eric; Rohm, Jason; Tow, Bryant (2004).
1486:
1429:
2673:
2627:
2607:
2504:
2484:
2439:
2287:
2211:
2196:
2181:
2166:
2161:
2156:
2151:
1954:
1583:
1050:
79:
2589:
2369:
2059:
2042:
2021:
1180:
1133:
528:
1682:
1221:
files - this means that any of its security faults automatically plague
2394:
2318:
1179:) file is easy to misuse. They are designed to allow logins without a
17:
2379:
2121:
2011:
917:
893:
856:
834:
uses the same format. The following shows some aspects of the format:
605:
520:
505:
493:
369:
263:
162:
142:
1081:
command lists the users who are logged in to the local Unix system,
1832:
A Practical Guide to Linux
Commands, Editors, and Shell Programming
1057:
overwrites an existing file of the same name in the target; unlike
2612:
2509:
2489:
2419:
2338:
2241:
2216:
2191:
2141:
2136:
2131:
2126:
2038:
2017:
1652:
1230:
942:
566:
390:
168:
2663:
2637:
2573:
2494:
2389:
2374:
2333:
2323:
2267:
2095:
767:(remote-copy, allowing files to be copied over the network) and
535:
501:
489:
358:
353:
323:
273:
193:
158:
75:
2068:
2464:
2364:
2308:
2206:
1043:
remote files are prefixed with the name of the remote system:
178:
1213:
The common practice of mounting users' home directories via
1187:
files, and actively scrutinize their networks for offenders.
2186:
1855:
1449:"A Case Study of Using a Secure Network Layer Protocol".
596:
The r-commands were a significant innovation, and became
1520:
z/OS Communications Server: IP User's Guide and
Commands
1136:. This information is tracked and stored by the daemon
1365:
Pyles, James; Carrell, Jeffrey L.; Tittel, Ed (2017).
786:), meaning the connection is established. For example:
1331:
Open
Sources: Voices from the Open Source Revolution
1148:
Those r-commands which involve user authentication (
2646:
2598:
2582:
2561:
2518:
2357:
2301:
2250:
2109:
1250:
1246:
1238:
1234:
1222:
1218:
1207:
1203:
1195:
1191:
1184:
1176:
1172:
1161:
1157:
1153:
1149:
1137:
1129:
1125:
1121:
1109:
1098:
1094:
1090:
1082:
1066:
1062:
1058:
1054:
1040:
1036:
1032:
1024:
1013:
1005:
1001:
997:
993:
981:
974:
950:
934:
913:
909:
901:
897:
882:
861:
831:
827:
823:
819:
815:
811:
807:
803:
799:
795:
764:
760:
665:
586:
582:
578:
570:
562:
554:
546:
100:
85:
69:
51:
35:
1283:"Using the Berkeley r-commands Without a Password"
1164:) share several serious security vulnerabilities:
1046:rcp file.txt subdomain.domain:~/home/foo/file.txt
969:and standard out flow through TCP port 514, while
838:host1 host2user_a -host3 +@group1-user_b -@group2
1190:The protocol partly relies on the remote party's
1939:(1st ed.). Prentice Hall. pp. 475–77.
1112:returns performance statistics from the kernel.
534:The CSRG incorporated the r-commands into their
1914:"Remote Access Services (rsh, rlogin, and rcp)"
1373:(5th ed.). Cengage Learning. p. 659.
511:. The r-commands were developed in 1982 by the
973:flows through a different TCP port, which the
2080:
1781:
1779:
457:
8:
1565:
1563:
759:The original Berkeley package that provides
30:
1648:CCSP: Secure PIX and Secure VPN Study Guide
2719:
2087:
2073:
2065:
1704:
1702:
1586:(Report). Internet Engineering Task Force.
1316:
1314:
1312:
1217:exposes rlogin to attack by means of fake
1140:, which is also used by the rwho command.
1085:lists those users who are logged into all
774:As an example, the protocol is as follows:
464:
450:
113:
29:
1454:
806:(applies to all users on the server) and
1367:"Which IP Services Are Most Vulnerable?"
610:
1273:
405:
338:
288:
123:
116:
1887:Sams Teach Yourself TCP/IP in 24 Hours
519:, based on an early implementation of
1962:Rogers, Lawrence R. (November 1998).
1538:
1536:
629:
624:
619:
616:
7:
2054:: remote login –
2033:: remote login –
1622:"hosts.equiv File Format for TCP/IP"
1548:FreeBSD Network Administrators Guide
1470:Nicholas Rosasco; David Larochelle.
953:passes input and output through the
864:enables a user to log in on another
1287:Unix System Management: Primer Plus
1210:client by using the same protocols.
1089:Unix systems on the local network.
1709:Farrell, Phillip (3 August 2004).
892:used by the software, part of the
630:
517:University of California, Berkeley
46:University of California, Berkeley
25:
1406:Negus, Christopher (2004-07-02).
2718:
2697:
2696:
1598:".rhosts File Format for TCP/IP"
1289:. Sams Publishing. p. 339.
488:designed to enable users of one
27:Suite of remote-access utilities
1856:"Unix job control command list"
1807:"ruptime (1) - Linux Man Pages"
1582:Kantor, Brian (December 1991).
941:on a remote computer without a
513:Computer Systems Research Group
42:Computer Systems Research Group
1371:Guide to TCP/IP: IPv6 and IPv4
1049:As with the Unix copy command
543:Berkeley Software Distribution
1:
2757:Unix network-related software
1964:"rlogin(1): The Untold Story"
1787:"rwhod (8) - Linux Man Pages"
1334:. O'Reilly & Associates.
1912:Noordergraaf, Alex (2003) .
1764:"rwho (1) - Linux Man Pages"
1412:Red Hat Fedora Linux 2 Bible
1935:Poniatowski, Marty (2000).
1883:"Berkeley Remote Utilities"
1132:reports that the system is
57:; 43 years ago
2773:
1834:. Pearson Education, Inc.
927:
854:
2692:
1899:– via Google Books.
1671:– via Google Books.
1383:– via Google Books.
1305:– via Google Books.
1198:protocol has no means of
738:
735:
732:
641:
636:
2058:User Commands Reference
1487:10.1007/1-4020-8090-5_18
1241:have replaced them with
885:is also the name of the
836:
788:
776:
608:) on networked systems.
1986:Penetration Testing Lab
1982:"Unix User Enumeration"
1322:McKusick, Marshall Kirk
1281:Horwitz, Jeff (2003) .
118:Internet protocol suite
2712:Unix SUS2008 utilities
2707:Standard Unix programs
2099:command-line interface
1740:"Rlogin, RSH, and RCP"
947:command-line interface
912:, on the remote host.
1889:. Pearson Education.
1830:Sobell, Mark (2010).
1715:earthsci.stanford.edu
1263:List of Unix commands
928:Further information:
2600:Software development
1937:UNIX User's Handbook
1858:. Indiana University
1408:"About "r" Commands"
1039:are similar, but in
965:. Over the network,
904:communicates with a
2006:, BSD Rlogin (1991)
1881:Casad, Joe (2008).
1215:Network File System
1069:uses TCP port 514.
1016:uses TCP port 512.
613:
478:Berkeley r-commands
32:
31:Berkeley r-commands
2752:Internet Standards
2747:Internet protocols
1569:Casad (2008), pp.
1479:Harvard University
1475:(Conference Paper)
916:is similar to the
611:
2734:
2733:
2041:General Commands
1946:978-0-13-027019-1
1927:978-0-13-100092-6
1920:. Prentice Hall.
1896:978-0-13-271513-3
1841:978-0-13-136736-4
1393:Casad (2008), p.
1380:978-1-305-94695-8
1345:978-1-56592-582-3
1336:Section: "4.2BSD"
1296:978-0-672-32372-0
887:application layer
752:
751:
486:computer programs
474:
473:
125:Application layer
112:
111:
16:(Redirected from
2764:
2722:
2721:
2700:
2699:
2302:User environment
2089:
2082:
2075:
2066:
2053:
2052:
2032:
2031:
2015:
2014:
1989:
1988:. 10 April 2012.
1977:
1975:
1969:. Archived from
1968:
1958:
1931:
1900:
1868:
1867:
1865:
1863:
1852:
1846:
1845:
1827:
1821:
1820:
1818:
1817:
1803:
1797:
1796:
1794:
1793:
1783:
1774:
1773:
1771:
1770:
1760:
1754:
1753:
1751:
1750:
1736:
1730:
1729:
1727:
1726:
1706:
1697:
1696:
1694:
1693:
1679:
1673:
1672:
1670:
1669:
1642:
1636:
1635:
1633:
1632:
1618:
1612:
1611:
1609:
1608:
1594:
1588:
1587:
1579:
1573:
1567:
1558:
1557:
1555:
1554:
1540:
1531:
1530:
1528:
1527:
1512:
1506:
1505:
1503:
1501:
1476:
1467:
1461:
1460:
1458:
1446:
1440:
1439:
1437:
1436:
1403:
1397:
1391:
1385:
1384:
1362:
1356:
1355:
1353:
1352:
1318:
1307:
1306:
1304:
1303:
1278:
1252:
1248:
1240:
1236:
1224:
1220:
1209:
1205:
1197:
1193:
1186:
1178:
1174:
1163:
1159:
1155:
1151:
1139:
1131:
1127:
1123:
1111:
1100:
1096:
1092:
1084:
1068:
1064:
1060:
1056:
1042:
1038:
1034:
1026:
1015:
1007:
1003:
999:
995:
983:
976:
955:standard streams
952:
936:
915:
911:
903:
899:
884:
870:computer network
863:
833:
829:
825:
821:
817:
813:
809:
805:
804:/etc/hosts.equiv
801:
797:
766:
762:
667:
632:
614:
588:
584:
580:
572:
564:
556:
548:
539:operating system
509:computer network
466:
459:
452:
114:
71:Operating system
65:
63:
58:
33:
21:
2772:
2771:
2767:
2766:
2765:
2763:
2762:
2761:
2737:
2736:
2735:
2730:
2688:
2642:
2594:
2578:
2557:
2514:
2358:Text processing
2353:
2297:
2246:
2105:
2093:
2048:
2047:
2027:
2026:
2010:
2009:
1996:
1980:
1973:
1966:
1961:
1947:
1934:
1928:
1911:
1908:
1906:Further reading
1903:
1897:
1880:
1876:
1871:
1861:
1859:
1854:
1853:
1849:
1842:
1829:
1828:
1824:
1815:
1813:
1805:
1804:
1800:
1791:
1789:
1785:
1784:
1777:
1768:
1766:
1762:
1761:
1757:
1748:
1746:
1738:
1737:
1733:
1724:
1722:
1708:
1707:
1700:
1691:
1689:
1681:
1680:
1676:
1667:
1665:
1663:
1655:. p. 154.
1644:
1643:
1639:
1630:
1628:
1620:
1619:
1615:
1606:
1604:
1596:
1595:
1591:
1581:
1580:
1576:
1568:
1561:
1552:
1550:
1544:"More on Ports"
1542:
1541:
1534:
1525:
1523:
1514:
1513:
1509:
1499:
1497:
1474:
1469:
1468:
1464:
1456:10.1.1.178.8497
1448:
1447:
1443:
1434:
1432:
1422:
1405:
1404:
1400:
1392:
1388:
1381:
1364:
1363:
1359:
1350:
1348:
1346:
1320:
1319:
1310:
1301:
1299:
1297:
1280:
1279:
1275:
1271:
1259:
1146:
1118:
1107:
1075:
1047:
1022:
990:
959:standard output
957:, and it sends
932:
926:
859:
853:
848:
840:
839:
792:
791:
780:
779:
757:
470:
290:Transport layer
61:
59:
56:
52:Initial release
28:
23:
22:
15:
12:
11:
5:
2770:
2768:
2760:
2759:
2754:
2749:
2739:
2738:
2732:
2731:
2729:
2728:
2716:
2715:
2714:
2709:
2693:
2690:
2689:
2687:
2686:
2684:true and false
2681:
2676:
2671:
2666:
2661:
2656:
2650:
2648:
2644:
2643:
2641:
2640:
2635:
2630:
2625:
2620:
2615:
2610:
2604:
2602:
2596:
2595:
2593:
2592:
2586:
2584:
2580:
2579:
2577:
2576:
2571:
2565:
2563:
2559:
2558:
2556:
2555:
2550:
2545:
2540:
2535:
2530:
2524:
2522:
2520:Shell builtins
2516:
2515:
2513:
2512:
2507:
2502:
2497:
2492:
2487:
2482:
2477:
2472:
2467:
2462:
2457:
2452:
2447:
2442:
2437:
2432:
2427:
2422:
2417:
2412:
2407:
2402:
2397:
2392:
2387:
2382:
2377:
2372:
2367:
2361:
2359:
2355:
2354:
2352:
2351:
2346:
2341:
2336:
2331:
2326:
2321:
2316:
2311:
2305:
2303:
2299:
2298:
2296:
2295:
2290:
2285:
2280:
2275:
2270:
2265:
2260:
2254:
2252:
2248:
2247:
2245:
2244:
2239:
2234:
2229:
2224:
2219:
2214:
2209:
2204:
2199:
2194:
2189:
2184:
2179:
2174:
2169:
2164:
2159:
2154:
2149:
2144:
2139:
2134:
2129:
2124:
2119:
2113:
2111:
2107:
2106:
2103:shell builtins
2094:
2092:
2091:
2084:
2077:
2069:
2063:
2062:
2045:
2024:
2020:User Commands
2007:
1995:
1994:External links
1992:
1991:
1990:
1978:
1976:on 2001-12-17.
1959:
1945:
1932:
1926:
1907:
1904:
1902:
1901:
1895:
1877:
1875:
1872:
1870:
1869:
1847:
1840:
1822:
1798:
1775:
1755:
1731:
1698:
1674:
1661:
1637:
1613:
1589:
1574:
1559:
1532:
1507:
1462:
1441:
1420:
1398:
1386:
1379:
1357:
1344:
1308:
1295:
1272:
1270:
1267:
1266:
1265:
1258:
1255:
1227:
1226:
1211:
1200:authenticating
1188:
1169:
1145:
1142:
1117:
1114:
1106:
1103:
1074:
1071:
1045:
1021:
1018:
1010:network socket
989:
986:
971:Standard Error
967:standard input
961:to the user's
925:
922:
852:
849:
847:
844:
837:
808:$ HOME/.rhosts
789:
784:null character
777:
763:also features
756:
753:
750:
749:
747:
743:
742:
740:
737:
734:
731:
727:
726:
724:
721:
719:
716:
712:
711:
709:
706:
703:
700:
696:
695:
693:
690:
687:
684:
680:
679:
677:
674:
671:
668:
662:
661:
659:
656:
653:
650:
646:
645:
640:
634:
633:
628:
623:
618:
525:protocol stack
472:
471:
469:
468:
461:
454:
446:
443:
442:
441:
440:
433:
428:
423:
418:
410:
409:
403:
402:
401:
400:
393:
388:
383:
378:
373:
363:
362:
361:
356:
343:
342:
340:Internet layer
336:
335:
334:
333:
326:
321:
316:
311:
306:
301:
293:
292:
286:
285:
284:
283:
276:
271:
266:
261:
256:
251:
246:
241:
236:
231:
226:
221:
216:
211:
206:
201:
196:
191:
186:
181:
176:
171:
166:
156:
151:
146:
136:
128:
127:
121:
120:
110:
109:
104:
98:
97:
89:
83:
82:
73:
67:
66:
55:June 1981
53:
49:
48:
39:
26:
24:
14:
13:
10:
9:
6:
4:
3:
2:
2769:
2758:
2755:
2753:
2750:
2748:
2745:
2744:
2742:
2727:
2726:
2717:
2713:
2710:
2708:
2705:
2704:
2703:
2695:
2694:
2691:
2685:
2682:
2680:
2677:
2675:
2672:
2670:
2667:
2665:
2662:
2660:
2657:
2655:
2652:
2651:
2649:
2647:Miscellaneous
2645:
2639:
2636:
2634:
2631:
2629:
2626:
2624:
2621:
2619:
2616:
2614:
2611:
2609:
2606:
2605:
2603:
2601:
2597:
2591:
2588:
2587:
2585:
2583:Documentation
2581:
2575:
2572:
2570:
2567:
2566:
2564:
2560:
2554:
2551:
2549:
2546:
2544:
2541:
2539:
2536:
2534:
2531:
2529:
2526:
2525:
2523:
2521:
2517:
2511:
2508:
2506:
2503:
2501:
2498:
2496:
2493:
2491:
2488:
2486:
2483:
2481:
2478:
2476:
2473:
2471:
2468:
2466:
2463:
2461:
2458:
2456:
2453:
2451:
2448:
2446:
2443:
2441:
2438:
2436:
2433:
2431:
2428:
2426:
2423:
2421:
2418:
2416:
2413:
2411:
2408:
2406:
2403:
2401:
2398:
2396:
2393:
2391:
2388:
2386:
2383:
2381:
2378:
2376:
2373:
2371:
2368:
2366:
2363:
2362:
2360:
2356:
2350:
2347:
2345:
2342:
2340:
2337:
2335:
2332:
2330:
2327:
2325:
2322:
2320:
2317:
2315:
2312:
2310:
2307:
2306:
2304:
2300:
2294:
2291:
2289:
2286:
2284:
2281:
2279:
2276:
2274:
2271:
2269:
2266:
2264:
2261:
2259:
2256:
2255:
2253:
2249:
2243:
2240:
2238:
2235:
2233:
2230:
2228:
2225:
2223:
2220:
2218:
2215:
2213:
2210:
2208:
2205:
2203:
2200:
2198:
2195:
2193:
2190:
2188:
2185:
2183:
2180:
2178:
2175:
2173:
2170:
2168:
2165:
2163:
2160:
2158:
2155:
2153:
2150:
2148:
2145:
2143:
2140:
2138:
2135:
2133:
2130:
2128:
2125:
2123:
2120:
2118:
2115:
2114:
2112:
2108:
2104:
2101:programs and
2100:
2097:
2090:
2085:
2083:
2078:
2076:
2071:
2070:
2067:
2061:
2057:
2051:
2046:
2044:
2040:
2036:
2030:
2025:
2023:
2019:
2016: –
2013:
2008:
2005:
2001:
1998:
1997:
1993:
1987:
1983:
1979:
1972:
1965:
1960:
1956:
1952:
1948:
1942:
1938:
1933:
1929:
1923:
1919:
1915:
1910:
1909:
1905:
1898:
1892:
1888:
1884:
1879:
1878:
1873:
1857:
1851:
1848:
1843:
1837:
1833:
1826:
1823:
1812:
1808:
1802:
1799:
1788:
1782:
1780:
1776:
1765:
1759:
1756:
1745:
1741:
1735:
1732:
1721:on 2021-02-07
1720:
1716:
1712:
1705:
1703:
1699:
1688:
1684:
1678:
1675:
1664:
1662:0-7821-4287-7
1658:
1654:
1650:
1649:
1641:
1638:
1627:
1623:
1617:
1614:
1603:
1599:
1593:
1590:
1585:
1578:
1575:
1572:
1566:
1564:
1560:
1549:
1545:
1539:
1537:
1533:
1521:
1517:
1511:
1508:
1496:
1492:
1488:
1484:
1480:
1473:
1466:
1463:
1457:
1452:
1445:
1442:
1431:
1427:
1423:
1421:0-7645-5745-9
1417:
1413:
1409:
1402:
1399:
1396:
1390:
1387:
1382:
1376:
1372:
1368:
1361:
1358:
1347:
1341:
1337:
1333:
1332:
1327:
1323:
1317:
1315:
1313:
1309:
1298:
1292:
1288:
1284:
1277:
1274:
1268:
1264:
1261:
1260:
1256:
1254:
1244:
1232:
1216:
1212:
1201:
1189:
1182:
1170:
1167:
1166:
1165:
1143:
1141:
1135:
1115:
1113:
1104:
1102:
1088:
1080:
1072:
1070:
1052:
1044:
1030:
1019:
1017:
1011:
987:
985:
979:
972:
968:
964:
960:
956:
948:
944:
940:
931:
923:
921:
919:
907:
895:
891:
888:
880:
878:
875:
871:
867:
858:
850:
845:
843:
835:
787:
785:
775:
772:
770:
754:
748:
745:
744:
741:
729:
728:
725:
722:
720:
717:
714:
713:
710:
707:
704:
701:
698:
697:
694:
691:
688:
685:
682:
681:
678:
675:
672:
669:
664:
663:
660:
657:
654:
651:
648:
647:
644:
639:
635:
627:
622:
615:
609:
607:
603:
599:
594:
592:
576:
568:
560:
552:
544:
540:
537:
532:
530:
526:
522:
518:
514:
510:
507:
504:computer via
503:
499:
495:
491:
487:
483:
479:
467:
462:
460:
455:
453:
448:
447:
445:
444:
439:
438:
434:
432:
429:
427:
424:
422:
419:
417:
414:
413:
412:
411:
408:
404:
399:
398:
394:
392:
389:
387:
384:
382:
379:
377:
374:
371:
367:
364:
360:
357:
355:
352:
351:
350:
347:
346:
345:
344:
341:
337:
332:
331:
327:
325:
322:
320:
317:
315:
312:
310:
307:
305:
302:
300:
297:
296:
295:
294:
291:
287:
282:
281:
277:
275:
272:
270:
267:
265:
262:
260:
257:
255:
252:
250:
247:
245:
242:
240:
237:
235:
232:
230:
227:
225:
222:
220:
217:
215:
212:
210:
207:
205:
202:
200:
197:
195:
192:
190:
187:
185:
182:
180:
177:
175:
172:
170:
167:
164:
160:
157:
155:
152:
150:
147:
144:
140:
137:
135:
132:
131:
130:
129:
126:
122:
119:
115:
108:
105:
103:
99:
96:
93:
90:
88:
84:
81:
77:
74:
72:
68:
54:
50:
47:
43:
40:
38:
34:
19:
2723:
2701:
2056:Solaris 11.4
1985:
1971:the original
1936:
1917:
1886:
1860:. Retrieved
1850:
1831:
1825:
1814:. Retrieved
1811:SysTutorials
1810:
1801:
1790:. Retrieved
1767:. Retrieved
1758:
1747:. Retrieved
1743:
1734:
1723:. Retrieved
1719:the original
1714:
1690:. Retrieved
1687:manpagez.com
1686:
1677:
1666:. Retrieved
1647:
1640:
1629:. Retrieved
1625:
1616:
1605:. Retrieved
1601:
1592:
1577:
1551:. Retrieved
1547:
1524:. Retrieved
1519:
1510:
1498:. Retrieved
1478:
1465:
1444:
1433:. Retrieved
1411:
1401:
1389:
1370:
1360:
1349:. Retrieved
1330:
1300:. Retrieved
1286:
1276:
1249:-equivalent
1228:
1147:
1120:Just as the
1119:
1108:
1077:Just as the
1076:
1048:
1023:
991:
933:
930:Remote Shell
881:
877:network port
860:
841:
822:connects to
814:connects to
793:
781:
773:
758:
602:Secure Shell
597:
595:
533:
477:
475:
436:
396:
329:
279:
37:Developer(s)
2110:File system
1862:20 December
1744:SourceDaddy
1683:"rexecd(8)"
1626:www.ibm.com
1602:www.ibm.com
1093:'s daemon,
828:hosts.equiv
500:to another
2741:Categories
2702:Categories
1874:References
1816:2018-03-07
1792:2018-03-07
1769:2018-03-07
1749:2018-02-18
1725:2018-03-06
1692:2018-03-03
1668:2018-03-07
1631:2023-11-29
1607:2023-11-29
1584:BSD Rlogin
1553:2018-03-04
1526:2018-03-04
1435:2018-03-04
1351:2018-03-03
1302:2018-03-04
1087:multi-user
855:See also:
802:share the
492:system to
407:Link layer
2562:Searching
2251:Processes
2050:rlogin(1)
2029:rlogin(1)
2012:rlogin(1)
1451:CiteSeerX
1430:441918216
1414:. Wiley.
1101:program.
1029:arguments
984:) opens.
626:Transport
612:Overview
559:execution
496:or issue
80:Unix-like
2370:basename
1955:43561861
1500:13 April
1495:19035681
1324:(1999).
1257:See also
1245:and its
1181:password
1144:Security
1004:server (
937:opens a
890:protocol
872:, using
846:Commands
818:, while
755:Protocol
598:de facto
589:(remote
573:(remote
565:(remote
557:(remote
549:(remote
529:Internet
498:commands
2475:strings
2395:dirname
2319:logname
2268:crontab
1522:. 2013
1219:.rhosts
1185:.rhosts
1177:.rhosts
1173:.rlogin
1130:ruptime
1126:ruptime
1116:ruptime
1099:ruptime
963:console
910:rlogind
832:.rhosts
816:rlogind
730:ruptime
686:rlogind
617:Service
583:ruptime
527:of the
515:at the
437:more...
421:Tunnels
397:more...
330:more...
280:more...
269:TLS/SSL
224:ONC/RPC
161: (
102:License
92:Command
62:1981-06
60: (
44:at the
2455:printf
2380:csplit
2122:chattr
2060:Manual
2043:Manual
2035:Darwin
2022:Manual
2002:
1953:
1943:
1924:
1893:
1838:
1659:
1571:350–51
1493:
1453:
1428:
1418:
1377:
1342:
1293:
1251:slogin
1247:rlogin
1239:telnet
1235:rlogin
1223:rlogin
1208:rlogin
1204:rlogin
1196:rlogin
1192:rlogin
1160:, and
1158:rlogin
1122:uptime
1006:rexecd
978:daemon
918:Telnet
914:rlogin
906:daemon
902:rlogin
898:rlogin
894:TCP/IP
883:rlogin
866:server
862:rlogin
857:Telnet
851:rlogin
812:rlogin
796:rlogin
761:rlogin
718:rstatd
683:rlogin
670:rexecd
643:Daemon
638:Client
606:Telnet
585:, and
563:rlogin
541:, the
521:TCP/IP
506:TCP/IP
494:log in
480:are a
264:Telnet
163:HTTP/3
18:Rlogin
2679:sleep
2633:strip
2613:ctags
2548:unset
2528:alias
2510:xargs
2490:troff
2450:patch
2445:paste
2420:iconv
2349:write
2339:uname
2242:umask
2232:touch
2222:split
2217:rmdir
2192:mkdir
2177:fuser
2142:cksum
2137:chgrp
2132:chown
2127:chmod
2039:macOS
2018:Linux
1974:(PDF)
1967:(PDF)
1711:"rcp"
1653:Sybex
1491:S2CID
1269:Notes
1231:Linux
1154:rexec
1138:rwhod
1110:rstat
1105:rstat
1095:rwhod
1014:rexec
1002:rexec
998:rexec
992:Like
988:rexec
943:login
939:shell
879:513.
794:Both
733:rwhod
715:rstat
666:rexec
579:rstat
575:shell
567:login
555:rexec
523:(the
482:suite
391:IPsec
169:HTTPS
95:suite
2725:List
2664:expr
2638:yacc
2623:make
2574:grep
2569:find
2553:wait
2543:test
2538:echo
2495:uniq
2480:tail
2470:sort
2460:read
2435:more
2425:join
2415:head
2410:fold
2390:diff
2375:comm
2334:tput
2329:talk
2324:mesg
2314:exit
2293:time
2283:nice
2278:kill
2237:type
2172:file
2096:Unix
2037:and
2004:1282
1951:OCLC
1941:ISBN
1922:ISBN
1891:ISBN
1864:2014
1836:ISBN
1657:ISBN
1502:2023
1426:OCLC
1416:ISBN
1375:ISBN
1340:ISBN
1291:ISBN
1237:and
1175:(or
1171:The
1134:down
1091:rwho
1083:rwho
1073:rwho
1035:and
982:rshd
868:via
830:and
824:rshd
798:and
746:rwho
702:rshd
652:rshd
631:Refs
621:Port
587:rwho
551:copy
536:Unix
502:Unix
490:Unix
476:The
386:IGMP
366:ICMP
324:QUIC
319:RSVP
314:SCTP
309:DCCP
274:XMPP
254:SNMP
249:SMTP
234:RTSP
209:OSPF
199:NNTP
194:MQTT
189:MGCP
184:LDAP
174:IMAP
159:HTTP
139:DHCP
87:Type
78:and
76:Unix
2659:cal
2618:lex
2590:man
2465:sed
2385:cut
2365:awk
2344:who
2309:env
2227:tee
2207:pwd
2202:pax
2147:cmp
2117:cat
2000:RFC
1483:doi
1395:346
1243:SSH
1162:rsh
1150:rcp
1079:who
1067:rcp
1063:rsh
1055:rcp
1041:rcp
1037:rcp
1031:of
1025:rcp
1020:rcp
994:rsh
975:rsh
951:rsh
935:rsh
924:rsh
874:TCP
820:rsh
800:rsh
769:rsh
765:rcp
739:UDP
736:513
723:UDP
708:TCP
705:514
699:rsh
692:TCP
689:513
676:TCP
673:512
658:TCP
655:514
649:rcp
593:).
591:who
577:),
571:rsh
569:),
561:),
553:),
547:rcp
531:).
484:of
431:MAC
426:PPP
416:ARP
381:ECN
376:NDP
304:UDP
299:TCP
259:SSH
244:SIP
239:RIP
229:RTP
219:PTP
214:POP
204:NTP
179:IRC
154:FTP
149:DNS
134:BGP
107:BSD
2743::
2674:od
2669:lp
2654:bc
2628:nm
2608:ar
2533:cd
2505:wc
2500:vi
2485:tr
2440:nl
2430:m4
2405:ex
2400:ed
2288:ps
2273:fg
2263:bg
2258:at
2212:rm
2197:mv
2187:ls
2182:ln
2167:df
2162:du
2157:dd
2152:cp
1984:.
1949:.
1916:.
1885:.
1809:.
1778:^
1742:.
1713:.
1701:^
1685:.
1651:.
1624:.
1600:.
1562:^
1546:.
1535:^
1518:.
1489:.
1481:.
1477:.
1424:.
1410:.
1369:.
1338:.
1328:.
1311:^
1285:.
1253:.
1156:,
1152:,
1065:,
1059:cp
1053:,
1051:cp
1033:cp
1012:.
996:,
949:.
908:,
826:.
581:,
370:v6
359:v6
354:v4
349:IP
143:v6
2088:e
2081:t
2074:v
1957:.
1930:.
1866:.
1844:.
1819:.
1795:.
1772:.
1752:.
1728:.
1695:.
1634:.
1610:.
1556:.
1529:.
1504:.
1485::
1459:.
1438:.
1354:.
1225:.
980:(
465:e
458:t
451:v
372:)
368:(
165:)
145:)
141:(
64:)
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.