Knowledge (XXG)

Berkeley r-commands

Source 📝

2698: 2720: 600:
standards for Unix operating systems. With wider public adoption of the Internet, their inherent security vulnerabilities became a problem, and beginning with the development of
1329: 463: 1027:
can copy a file or directory from the local system to a remote system, from a remote system to the local system, or from one remote system to another. The command line
1128:
requests a status report from all computers on the local network. It then returns the uptime report. If a computer did not respond within the time limit, then
223: 842:
This allows all users from host1 to login, user_a from host2 to login, no users from host3, all users on group1 except user_b, and no users on group2.
1183:, but their reliance on remote usernames, hostnames, and IP addresses is exploitable. For this reason many corporate system administrators prohibit 2086: 896:
protocol suite. Authenticated users can act as if they were physically present at the computer. RFC 1282, in which it was defined, states: "The
2756: 1194:
client to provide information honestly, including source port and source host name. A malicious client can forge this and gain access, as the
1710: 1944: 1925: 1894: 1839: 1378: 1343: 1294: 456: 183: 313: 308: 278: 138: 778:
Client: <null> usernameontheclient<null> usernameontheserver<null> terminaltype/terminalbaudrate<null> Server:
516: 385: 328: 253: 45: 810:(applies to only the user that puts the file in its home folder) access-control scheme, although they connect to different daemons. 1660: 1419: 395: 365: 1515: 1028: 449: 380: 173: 2711: 2706: 512: 41: 542: 198: 188: 1097:, maintains a database of the status of Unix systems on the local network. The daemon and its database are also used by the 1202:
the client is running on a trusted machine. It also cannot check if the requesting client on a trusted machine is the real
873: 318: 298: 248: 1963: 238: 233: 228: 2751: 2746: 2079: 1471: 415: 375: 243: 782:
The server would check that the user should have access. If so, it returns a message with nothing in it (not even a
2055: 905: 642: 620: 2683: 2653: 2034: 1621: 2668: 604:
protocols and applications in 1995, its adoption entirely supplanted the deployment and use of r-commands (and
268: 208: 1597: 900:
facility provides a remote-echoed, locally flow-controlled virtual terminal with proper flushing of output."
889: 435: 425: 218: 133: 117: 2724: 2429: 2098: 2072: 2064: 1543: 1450: 1321: 946: 303: 153: 1262: 1168:
All information, including passwords, is transmitted unencrypted (making it vulnerable to interception).
558: 430: 203: 1913: 2599: 2547: 1918:
Enterprise Security: Solaris Operating Environment, Security Journal, Solaris OE v2.51, 2.6, 7, and 8
1407: 1008:) requires login: it authenticates users by reading the username and password (unencrypted) from the 213: 1455: 945:
procedure. Once connected, the user can execute commands on the remote computer through the shell's
1718: 1214: 497: 91: 86: 771:(remote-shell, allowing commands to be run on a remote machine without the user logging into it). 2272: 2262: 2049: 1490: 1472:"How and Why More Secure Technologies Succeed in Legacy Markets: Lessons from the Success of SSH" 1000:
enables the user to run shell commands on a remote computer. However, unlike the rsh server, the
977: 865: 637: 625: 420: 148: 1325: 1516:"REXEC command—Execute a command on the remote host and receive the results on your local host" 1950: 1940: 1921: 1890: 1882: 1835: 1656: 1646: 1570: 1425: 1415: 1394: 1374: 1366: 1339: 1290: 1282: 938: 886: 574: 348: 124: 2499: 2404: 2399: 1999: 1981: 1739: 1482: 970: 954: 869: 538: 508: 485: 101: 70: 1233:
distributions no longer including them by default). Many networks that formerly relied on
790:
Client: <null> bostic<null> kbostic<null> vt100/9600<null> Server:
2678: 2622: 2527: 2328: 2231: 1717:. Stanford University School of Earth, Energy & Environmental Sciences. Archived from 962: 958: 289: 1806: 1061:, it provides no mechanism for warning the user before overwriting the target file. Like 2028: 2617: 2552: 2537: 2474: 2434: 2313: 2277: 2171: 1786: 1335: 1199: 1009: 966: 783: 524: 481: 339: 94: 1763: 2740: 2658: 2519: 2454: 2226: 2201: 2102: 1494: 1229:
Due to these problems, the r-commands fell into relative disuse (with many Unix and
920:
command, but is not as customizable and is able to connect only to Unix-like hosts.
2632: 2532: 2449: 2444: 2348: 2257: 2221: 2176: 1242: 929: 876: 768: 601: 550: 258: 106: 545:(BSD). The r-commands premiered in BSD v4.1. Among the programs in the suite are: 2568: 2542: 2479: 2469: 2459: 2424: 2414: 2409: 2292: 2282: 2236: 2003: 1206:
client, meaning that malicious programs may pretend to be a standard-conforming
2384: 2343: 2146: 2116: 1970: 1326:"Twenty Years of Berkeley Unix: From AT&T-Owned to Freely Redistributable" 1124:
command shows how long a Unix system has been running since the last restart,
1086: 1078: 590: 406: 36: 1645:
Edwards, Wade; Lancaster, Tom; Quinn, Eric; Rohm, Jason; Tow, Bryant (2004).
1486: 1429: 2673: 2627: 2607: 2504: 2484: 2439: 2287: 2211: 2196: 2181: 2166: 2161: 2156: 2151: 1954: 1583: 1050: 79: 2589: 2369: 2059: 2042: 2021: 1180: 1133: 528: 1682: 1221:
files - this means that any of its security faults automatically plague
2394: 2318: 1179:) file is easy to misuse. They are designed to allow logins without a 17: 2379: 2121: 2011: 917: 893: 856: 834:
uses the same format. The following shows some aspects of the format:
605: 520: 505: 493: 369: 263: 162: 142: 1081:
command lists the users who are logged in to the local Unix system,
1832:
A Practical Guide to Linux Commands, Editors, and Shell Programming
1057:
overwrites an existing file of the same name in the target; unlike
2612: 2509: 2489: 2419: 2338: 2241: 2216: 2191: 2141: 2136: 2131: 2126: 2038: 2017: 1652: 1230: 942: 566: 390: 168: 2663: 2637: 2573: 2494: 2389: 2374: 2333: 2323: 2267: 2095: 767:(remote-copy, allowing files to be copied over the network) and 535: 501: 489: 358: 353: 323: 273: 193: 158: 75: 2068: 2464: 2364: 2308: 2206: 1043:
remote files are prefixed with the name of the remote system:
178: 1213:
The common practice of mounting users' home directories via
1187:
files, and actively scrutinize their networks for offenders.
2186: 1855: 1449:"A Case Study of Using a Secure Network Layer Protocol". 596:
The r-commands were a significant innovation, and became
1520:
z/OS Communications Server: IP User's Guide and Commands
1136:. This information is tracked and stored by the daemon 1365:
Pyles, James; Carrell, Jeffrey L.; Tittel, Ed (2017).
786:), meaning the connection is established. For example: 1331:
Open Sources: Voices from the Open Source Revolution
1148:
Those r-commands which involve user authentication (
2646: 2598: 2582: 2561: 2518: 2357: 2301: 2250: 2109: 1250: 1246: 1238: 1234: 1222: 1218: 1207: 1203: 1195: 1191: 1184: 1176: 1172: 1161: 1157: 1153: 1149: 1137: 1129: 1125: 1121: 1109: 1098: 1094: 1090: 1082: 1066: 1062: 1058: 1054: 1040: 1036: 1032: 1024: 1013: 1005: 1001: 997: 993: 981: 974: 950: 934: 913: 909: 901: 897: 882: 861: 831: 827: 823: 819: 815: 811: 807: 803: 799: 795: 764: 760: 665: 586: 582: 578: 570: 562: 554: 546: 100: 85: 69: 51: 35: 1283:"Using the Berkeley r-commands Without a Password" 1164:) share several serious security vulnerabilities: 1046:rcp file.txt subdomain.domain:~/home/foo/file.txt 969:and standard out flow through TCP port 514, while 838:host1 host2user_a -host3 +@group1-user_b -@group2 1190:The protocol partly relies on the remote party's 1939:(1st ed.). Prentice Hall. pp. 475–77. 1112:returns performance statistics from the kernel. 534:The CSRG incorporated the r-commands into their 1914:"Remote Access Services (rsh, rlogin, and rcp)" 1373:(5th ed.). Cengage Learning. p. 659. 511:. The r-commands were developed in 1982 by the 973:flows through a different TCP port, which the 2080: 1781: 1779: 457: 8: 1565: 1563: 759:The original Berkeley package that provides 30: 1648:CCSP: Secure PIX and Secure VPN Study Guide 2719: 2087: 2073: 2065: 1704: 1702: 1586:(Report). Internet Engineering Task Force. 1316: 1314: 1312: 1217:exposes rlogin to attack by means of fake 1140:, which is also used by the rwho command. 1085:lists those users who are logged into all 774:As an example, the protocol is as follows: 464: 450: 113: 29: 1454: 806:(applies to all users on the server) and 1367:"Which IP Services Are Most Vulnerable?" 610: 1273: 405: 338: 288: 123: 116: 1887:Sams Teach Yourself TCP/IP in 24 Hours 519:, based on an early implementation of 1962:Rogers, Lawrence R. (November 1998). 1538: 1536: 629: 624: 619: 616: 7: 2054:: remote login –  2033:: remote login –  1622:"hosts.equiv File Format for TCP/IP" 1548:FreeBSD Network Administrators Guide 1470:Nicholas Rosasco; David Larochelle. 953:passes input and output through the 864:enables a user to log in on another 1287:Unix System Management: Primer Plus 1210:client by using the same protocols. 1089:Unix systems on the local network. 1709:Farrell, Phillip (3 August 2004). 892:used by the software, part of the 630: 517:University of California, Berkeley 46:University of California, Berkeley 25: 1406:Negus, Christopher (2004-07-02). 2718: 2697: 2696: 1598:".rhosts File Format for TCP/IP" 1289:. Sams Publishing. p. 339. 488:designed to enable users of one 27:Suite of remote-access utilities 1856:"Unix job control command list" 1807:"ruptime (1) - Linux Man Pages" 1582:Kantor, Brian (December 1991). 941:on a remote computer without a 513:Computer Systems Research Group 42:Computer Systems Research Group 1371:Guide to TCP/IP: IPv6 and IPv4 1049:As with the Unix copy command 543:Berkeley Software Distribution 1: 2757:Unix network-related software 1964:"rlogin(1): The Untold Story" 1787:"rwhod (8) - Linux Man Pages" 1334:. O'Reilly & Associates. 1912:Noordergraaf, Alex (2003) . 1764:"rwho (1) - Linux Man Pages" 1412:Red Hat Fedora Linux 2 Bible 1935:Poniatowski, Marty (2000). 1883:"Berkeley Remote Utilities" 1132:reports that the system is 57:; 43 years ago 2773: 1834:. Pearson Education, Inc. 927: 854: 2692: 1899:– via Google Books. 1671:– via Google Books. 1383:– via Google Books. 1305:– via Google Books. 1198:protocol has no means of 738: 735: 732: 641: 636: 2058:User Commands Reference 1487:10.1007/1-4020-8090-5_18 1241:have replaced them with 885:is also the name of the 836: 788: 776: 608:) on networked systems. 1986:Penetration Testing Lab 1982:"Unix User Enumeration" 1322:McKusick, Marshall Kirk 1281:Horwitz, Jeff (2003) . 118:Internet protocol suite 2712:Unix SUS2008 utilities 2707:Standard Unix programs 2099:command-line interface 1740:"Rlogin, RSH, and RCP" 947:command-line interface 912:, on the remote host. 1889:. Pearson Education. 1830:Sobell, Mark (2010). 1715:earthsci.stanford.edu 1263:List of Unix commands 928:Further information: 2600:Software development 1937:UNIX User's Handbook 1858:. Indiana University 1408:"About "r" Commands" 1039:are similar, but in 965:. Over the network, 904:communicates with a 2006:, BSD Rlogin (1991) 1881:Casad, Joe (2008). 1215:Network File System 1069:uses TCP port 514. 1016:uses TCP port 512. 613: 478:Berkeley r-commands 32: 31:Berkeley r-commands 2752:Internet Standards 2747:Internet protocols 1569:Casad (2008), pp. 1479:Harvard University 1475:(Conference Paper) 916:is similar to the 611: 2734: 2733: 2041:General Commands 1946:978-0-13-027019-1 1927:978-0-13-100092-6 1920:. Prentice Hall. 1896:978-0-13-271513-3 1841:978-0-13-136736-4 1393:Casad (2008), p. 1380:978-1-305-94695-8 1345:978-1-56592-582-3 1336:Section: "4.2BSD" 1296:978-0-672-32372-0 887:application layer 752: 751: 486:computer programs 474: 473: 125:Application layer 112: 111: 16:(Redirected from 2764: 2722: 2721: 2700: 2699: 2302:User environment 2089: 2082: 2075: 2066: 2053: 2052: 2032: 2031: 2015: 2014: 1989: 1988:. 10 April 2012. 1977: 1975: 1969:. Archived from 1968: 1958: 1931: 1900: 1868: 1867: 1865: 1863: 1852: 1846: 1845: 1827: 1821: 1820: 1818: 1817: 1803: 1797: 1796: 1794: 1793: 1783: 1774: 1773: 1771: 1770: 1760: 1754: 1753: 1751: 1750: 1736: 1730: 1729: 1727: 1726: 1706: 1697: 1696: 1694: 1693: 1679: 1673: 1672: 1670: 1669: 1642: 1636: 1635: 1633: 1632: 1618: 1612: 1611: 1609: 1608: 1594: 1588: 1587: 1579: 1573: 1567: 1558: 1557: 1555: 1554: 1540: 1531: 1530: 1528: 1527: 1512: 1506: 1505: 1503: 1501: 1476: 1467: 1461: 1460: 1458: 1446: 1440: 1439: 1437: 1436: 1403: 1397: 1391: 1385: 1384: 1362: 1356: 1355: 1353: 1352: 1318: 1307: 1306: 1304: 1303: 1278: 1252: 1248: 1240: 1236: 1224: 1220: 1209: 1205: 1197: 1193: 1186: 1178: 1174: 1163: 1159: 1155: 1151: 1139: 1131: 1127: 1123: 1111: 1100: 1096: 1092: 1084: 1068: 1064: 1060: 1056: 1042: 1038: 1034: 1026: 1015: 1007: 1003: 999: 995: 983: 976: 955:standard streams 952: 936: 915: 911: 903: 899: 884: 870:computer network 863: 833: 829: 825: 821: 817: 813: 809: 805: 804:/etc/hosts.equiv 801: 797: 766: 762: 667: 632: 614: 588: 584: 580: 572: 564: 556: 548: 539:operating system 509:computer network 466: 459: 452: 114: 71:Operating system 65: 63: 58: 33: 21: 2772: 2771: 2767: 2766: 2765: 2763: 2762: 2761: 2737: 2736: 2735: 2730: 2688: 2642: 2594: 2578: 2557: 2514: 2358:Text processing 2353: 2297: 2246: 2105: 2093: 2048: 2047: 2027: 2026: 2010: 2009: 1996: 1980: 1973: 1966: 1961: 1947: 1934: 1928: 1911: 1908: 1906:Further reading 1903: 1897: 1880: 1876: 1871: 1861: 1859: 1854: 1853: 1849: 1842: 1829: 1828: 1824: 1815: 1813: 1805: 1804: 1800: 1791: 1789: 1785: 1784: 1777: 1768: 1766: 1762: 1761: 1757: 1748: 1746: 1738: 1737: 1733: 1724: 1722: 1708: 1707: 1700: 1691: 1689: 1681: 1680: 1676: 1667: 1665: 1663: 1655:. p. 154. 1644: 1643: 1639: 1630: 1628: 1620: 1619: 1615: 1606: 1604: 1596: 1595: 1591: 1581: 1580: 1576: 1568: 1561: 1552: 1550: 1544:"More on Ports" 1542: 1541: 1534: 1525: 1523: 1514: 1513: 1509: 1499: 1497: 1474: 1469: 1468: 1464: 1456:10.1.1.178.8497 1448: 1447: 1443: 1434: 1432: 1422: 1405: 1404: 1400: 1392: 1388: 1381: 1364: 1363: 1359: 1350: 1348: 1346: 1320: 1319: 1310: 1301: 1299: 1297: 1280: 1279: 1275: 1271: 1259: 1146: 1118: 1107: 1075: 1047: 1022: 990: 959:standard output 957:, and it sends 932: 926: 859: 853: 848: 840: 839: 792: 791: 780: 779: 757: 470: 290:Transport layer 61: 59: 56: 52:Initial release 28: 23: 22: 15: 12: 11: 5: 2770: 2768: 2760: 2759: 2754: 2749: 2739: 2738: 2732: 2731: 2729: 2728: 2716: 2715: 2714: 2709: 2693: 2690: 2689: 2687: 2686: 2684:true and false 2681: 2676: 2671: 2666: 2661: 2656: 2650: 2648: 2644: 2643: 2641: 2640: 2635: 2630: 2625: 2620: 2615: 2610: 2604: 2602: 2596: 2595: 2593: 2592: 2586: 2584: 2580: 2579: 2577: 2576: 2571: 2565: 2563: 2559: 2558: 2556: 2555: 2550: 2545: 2540: 2535: 2530: 2524: 2522: 2520:Shell builtins 2516: 2515: 2513: 2512: 2507: 2502: 2497: 2492: 2487: 2482: 2477: 2472: 2467: 2462: 2457: 2452: 2447: 2442: 2437: 2432: 2427: 2422: 2417: 2412: 2407: 2402: 2397: 2392: 2387: 2382: 2377: 2372: 2367: 2361: 2359: 2355: 2354: 2352: 2351: 2346: 2341: 2336: 2331: 2326: 2321: 2316: 2311: 2305: 2303: 2299: 2298: 2296: 2295: 2290: 2285: 2280: 2275: 2270: 2265: 2260: 2254: 2252: 2248: 2247: 2245: 2244: 2239: 2234: 2229: 2224: 2219: 2214: 2209: 2204: 2199: 2194: 2189: 2184: 2179: 2174: 2169: 2164: 2159: 2154: 2149: 2144: 2139: 2134: 2129: 2124: 2119: 2113: 2111: 2107: 2106: 2103:shell builtins 2094: 2092: 2091: 2084: 2077: 2069: 2063: 2062: 2045: 2024: 2020:User Commands 2007: 1995: 1994:External links 1992: 1991: 1990: 1978: 1976:on 2001-12-17. 1959: 1945: 1932: 1926: 1907: 1904: 1902: 1901: 1895: 1877: 1875: 1872: 1870: 1869: 1847: 1840: 1822: 1798: 1775: 1755: 1731: 1698: 1674: 1661: 1637: 1613: 1589: 1574: 1559: 1532: 1507: 1462: 1441: 1420: 1398: 1386: 1379: 1357: 1344: 1308: 1295: 1272: 1270: 1267: 1266: 1265: 1258: 1255: 1227: 1226: 1211: 1200:authenticating 1188: 1169: 1145: 1142: 1117: 1114: 1106: 1103: 1074: 1071: 1045: 1021: 1018: 1010:network socket 989: 986: 971:Standard Error 967:standard input 961:to the user's 925: 922: 852: 849: 847: 844: 837: 808:$ HOME/.rhosts 789: 784:null character 777: 763:also features 756: 753: 750: 749: 747: 743: 742: 740: 737: 734: 731: 727: 726: 724: 721: 719: 716: 712: 711: 709: 706: 703: 700: 696: 695: 693: 690: 687: 684: 680: 679: 677: 674: 671: 668: 662: 661: 659: 656: 653: 650: 646: 645: 640: 634: 633: 628: 623: 618: 525:protocol stack 472: 471: 469: 468: 461: 454: 446: 443: 442: 441: 440: 433: 428: 423: 418: 410: 409: 403: 402: 401: 400: 393: 388: 383: 378: 373: 363: 362: 361: 356: 343: 342: 340:Internet layer 336: 335: 334: 333: 326: 321: 316: 311: 306: 301: 293: 292: 286: 285: 284: 283: 276: 271: 266: 261: 256: 251: 246: 241: 236: 231: 226: 221: 216: 211: 206: 201: 196: 191: 186: 181: 176: 171: 166: 156: 151: 146: 136: 128: 127: 121: 120: 110: 109: 104: 98: 97: 89: 83: 82: 73: 67: 66: 55:June 1981 53: 49: 48: 39: 26: 24: 14: 13: 10: 9: 6: 4: 3: 2: 2769: 2758: 2755: 2753: 2750: 2748: 2745: 2744: 2742: 2727: 2726: 2717: 2713: 2710: 2708: 2705: 2704: 2703: 2695: 2694: 2691: 2685: 2682: 2680: 2677: 2675: 2672: 2670: 2667: 2665: 2662: 2660: 2657: 2655: 2652: 2651: 2649: 2647:Miscellaneous 2645: 2639: 2636: 2634: 2631: 2629: 2626: 2624: 2621: 2619: 2616: 2614: 2611: 2609: 2606: 2605: 2603: 2601: 2597: 2591: 2588: 2587: 2585: 2583:Documentation 2581: 2575: 2572: 2570: 2567: 2566: 2564: 2560: 2554: 2551: 2549: 2546: 2544: 2541: 2539: 2536: 2534: 2531: 2529: 2526: 2525: 2523: 2521: 2517: 2511: 2508: 2506: 2503: 2501: 2498: 2496: 2493: 2491: 2488: 2486: 2483: 2481: 2478: 2476: 2473: 2471: 2468: 2466: 2463: 2461: 2458: 2456: 2453: 2451: 2448: 2446: 2443: 2441: 2438: 2436: 2433: 2431: 2428: 2426: 2423: 2421: 2418: 2416: 2413: 2411: 2408: 2406: 2403: 2401: 2398: 2396: 2393: 2391: 2388: 2386: 2383: 2381: 2378: 2376: 2373: 2371: 2368: 2366: 2363: 2362: 2360: 2356: 2350: 2347: 2345: 2342: 2340: 2337: 2335: 2332: 2330: 2327: 2325: 2322: 2320: 2317: 2315: 2312: 2310: 2307: 2306: 2304: 2300: 2294: 2291: 2289: 2286: 2284: 2281: 2279: 2276: 2274: 2271: 2269: 2266: 2264: 2261: 2259: 2256: 2255: 2253: 2249: 2243: 2240: 2238: 2235: 2233: 2230: 2228: 2225: 2223: 2220: 2218: 2215: 2213: 2210: 2208: 2205: 2203: 2200: 2198: 2195: 2193: 2190: 2188: 2185: 2183: 2180: 2178: 2175: 2173: 2170: 2168: 2165: 2163: 2160: 2158: 2155: 2153: 2150: 2148: 2145: 2143: 2140: 2138: 2135: 2133: 2130: 2128: 2125: 2123: 2120: 2118: 2115: 2114: 2112: 2108: 2104: 2101:programs and 2100: 2097: 2090: 2085: 2083: 2078: 2076: 2071: 2070: 2067: 2061: 2057: 2051: 2046: 2044: 2040: 2036: 2030: 2025: 2023: 2019: 2016: –  2013: 2008: 2005: 2001: 1998: 1997: 1993: 1987: 1983: 1979: 1972: 1965: 1960: 1956: 1952: 1948: 1942: 1938: 1933: 1929: 1923: 1919: 1915: 1910: 1909: 1905: 1898: 1892: 1888: 1884: 1879: 1878: 1873: 1857: 1851: 1848: 1843: 1837: 1833: 1826: 1823: 1812: 1808: 1802: 1799: 1788: 1782: 1780: 1776: 1765: 1759: 1756: 1745: 1741: 1735: 1732: 1721:on 2021-02-07 1720: 1716: 1712: 1705: 1703: 1699: 1688: 1684: 1678: 1675: 1664: 1662:0-7821-4287-7 1658: 1654: 1650: 1649: 1641: 1638: 1627: 1623: 1617: 1614: 1603: 1599: 1593: 1590: 1585: 1578: 1575: 1572: 1566: 1564: 1560: 1549: 1545: 1539: 1537: 1533: 1521: 1517: 1511: 1508: 1496: 1492: 1488: 1484: 1480: 1473: 1466: 1463: 1457: 1452: 1445: 1442: 1431: 1427: 1423: 1421:0-7645-5745-9 1417: 1413: 1409: 1402: 1399: 1396: 1390: 1387: 1382: 1376: 1372: 1368: 1361: 1358: 1347: 1341: 1337: 1333: 1332: 1327: 1323: 1317: 1315: 1313: 1309: 1298: 1292: 1288: 1284: 1277: 1274: 1268: 1264: 1261: 1260: 1256: 1254: 1244: 1232: 1216: 1212: 1201: 1189: 1182: 1170: 1167: 1166: 1165: 1143: 1141: 1135: 1115: 1113: 1104: 1102: 1088: 1080: 1072: 1070: 1052: 1044: 1030: 1019: 1017: 1011: 987: 985: 979: 972: 968: 964: 960: 956: 948: 944: 940: 931: 923: 921: 919: 907: 895: 891: 888: 880: 878: 875: 871: 867: 858: 850: 845: 843: 835: 787: 785: 775: 772: 770: 754: 748: 745: 744: 741: 729: 728: 725: 722: 720: 717: 714: 713: 710: 707: 704: 701: 698: 697: 694: 691: 688: 685: 682: 681: 678: 675: 672: 669: 664: 663: 660: 657: 654: 651: 648: 647: 644: 639: 635: 627: 622: 615: 609: 607: 603: 599: 594: 592: 576: 568: 560: 552: 544: 540: 537: 532: 530: 526: 522: 518: 514: 510: 507: 504:computer via 503: 499: 495: 491: 487: 483: 479: 467: 462: 460: 455: 453: 448: 447: 445: 444: 439: 438: 434: 432: 429: 427: 424: 422: 419: 417: 414: 413: 412: 411: 408: 404: 399: 398: 394: 392: 389: 387: 384: 382: 379: 377: 374: 371: 367: 364: 360: 357: 355: 352: 351: 350: 347: 346: 345: 344: 341: 337: 332: 331: 327: 325: 322: 320: 317: 315: 312: 310: 307: 305: 302: 300: 297: 296: 295: 294: 291: 287: 282: 281: 277: 275: 272: 270: 267: 265: 262: 260: 257: 255: 252: 250: 247: 245: 242: 240: 237: 235: 232: 230: 227: 225: 222: 220: 217: 215: 212: 210: 207: 205: 202: 200: 197: 195: 192: 190: 187: 185: 182: 180: 177: 175: 172: 170: 167: 164: 160: 157: 155: 152: 150: 147: 144: 140: 137: 135: 132: 131: 130: 129: 126: 122: 119: 115: 108: 105: 103: 99: 96: 93: 90: 88: 84: 81: 77: 74: 72: 68: 54: 50: 47: 43: 40: 38: 34: 19: 2723: 2701: 2056:Solaris 11.4 1985: 1971:the original 1936: 1917: 1886: 1860:. Retrieved 1850: 1831: 1825: 1814:. Retrieved 1811:SysTutorials 1810: 1801: 1790:. Retrieved 1767:. Retrieved 1758: 1747:. Retrieved 1743: 1734: 1723:. Retrieved 1719:the original 1714: 1690:. Retrieved 1687:manpagez.com 1686: 1677: 1666:. Retrieved 1647: 1640: 1629:. Retrieved 1625: 1616: 1605:. Retrieved 1601: 1592: 1577: 1551:. Retrieved 1547: 1524:. Retrieved 1519: 1510: 1498:. Retrieved 1478: 1465: 1444: 1433:. Retrieved 1411: 1401: 1389: 1370: 1360: 1349:. Retrieved 1330: 1300:. Retrieved 1286: 1276: 1249:-equivalent 1228: 1147: 1120:Just as the 1119: 1108: 1077:Just as the 1076: 1048: 1023: 991: 933: 930:Remote Shell 881: 877:network port 860: 841: 822:connects to 814:connects to 793: 781: 773: 758: 602:Secure Shell 597: 595: 533: 477: 475: 436: 396: 329: 279: 37:Developer(s) 2110:File system 1862:20 December 1744:SourceDaddy 1683:"rexecd(8)" 1626:www.ibm.com 1602:www.ibm.com 1093:'s daemon, 828:hosts.equiv 500:to another 2741:Categories 2702:Categories 1874:References 1816:2018-03-07 1792:2018-03-07 1769:2018-03-07 1749:2018-02-18 1725:2018-03-06 1692:2018-03-03 1668:2018-03-07 1631:2023-11-29 1607:2023-11-29 1584:BSD Rlogin 1553:2018-03-04 1526:2018-03-04 1435:2018-03-04 1351:2018-03-03 1302:2018-03-04 1087:multi-user 855:See also: 802:share the 492:system to 407:Link layer 2562:Searching 2251:Processes 2050:rlogin(1) 2029:rlogin(1) 2012:rlogin(1) 1451:CiteSeerX 1430:441918216 1414:. Wiley. 1101:program. 1029:arguments 984:) opens. 626:Transport 612:Overview 559:execution 496:or issue 80:Unix-like 2370:basename 1955:43561861 1500:13 April 1495:19035681 1324:(1999). 1257:See also 1245:and its 1181:password 1144:Security 1004:server ( 937:opens a 890:protocol 872:, using 846:Commands 818:, while 755:Protocol 598:de facto 589:(remote 573:(remote 565:(remote 557:(remote 549:(remote 529:Internet 498:commands 2475:strings 2395:dirname 2319:logname 2268:crontab 1522:. 2013 1219:.rhosts 1185:.rhosts 1177:.rhosts 1173:.rlogin 1130:ruptime 1126:ruptime 1116:ruptime 1099:ruptime 963:console 910:rlogind 832:.rhosts 816:rlogind 730:ruptime 686:rlogind 617:Service 583:ruptime 527:of the 515:at the 437:more... 421:Tunnels 397:more... 330:more... 280:more... 269:TLS/SSL 224:ONC/RPC 161: ( 102:License 92:Command 62:1981-06 60: ( 44:at the 2455:printf 2380:csplit 2122:chattr 2060:Manual 2043:Manual 2035:Darwin 2022:Manual 2002:  1953:  1943:  1924:  1893:  1838:  1659:  1571:350–51 1493:  1453:  1428:  1418:  1377:  1342:  1293:  1251:slogin 1247:rlogin 1239:telnet 1235:rlogin 1223:rlogin 1208:rlogin 1204:rlogin 1196:rlogin 1192:rlogin 1160:, and 1158:rlogin 1122:uptime 1006:rexecd 978:daemon 918:Telnet 914:rlogin 906:daemon 902:rlogin 898:rlogin 894:TCP/IP 883:rlogin 866:server 862:rlogin 857:Telnet 851:rlogin 812:rlogin 796:rlogin 761:rlogin 718:rstatd 683:rlogin 670:rexecd 643:Daemon 638:Client 606:Telnet 585:, and 563:rlogin 541:, the 521:TCP/IP 506:TCP/IP 494:log in 480:are a 264:Telnet 163:HTTP/3 18:Rlogin 2679:sleep 2633:strip 2613:ctags 2548:unset 2528:alias 2510:xargs 2490:troff 2450:patch 2445:paste 2420:iconv 2349:write 2339:uname 2242:umask 2232:touch 2222:split 2217:rmdir 2192:mkdir 2177:fuser 2142:cksum 2137:chgrp 2132:chown 2127:chmod 2039:macOS 2018:Linux 1974:(PDF) 1967:(PDF) 1711:"rcp" 1653:Sybex 1491:S2CID 1269:Notes 1231:Linux 1154:rexec 1138:rwhod 1110:rstat 1105:rstat 1095:rwhod 1014:rexec 1002:rexec 998:rexec 992:Like 988:rexec 943:login 939:shell 879:513. 794:Both 733:rwhod 715:rstat 666:rexec 579:rstat 575:shell 567:login 555:rexec 523:(the 482:suite 391:IPsec 169:HTTPS 95:suite 2725:List 2664:expr 2638:yacc 2623:make 2574:grep 2569:find 2553:wait 2543:test 2538:echo 2495:uniq 2480:tail 2470:sort 2460:read 2435:more 2425:join 2415:head 2410:fold 2390:diff 2375:comm 2334:tput 2329:talk 2324:mesg 2314:exit 2293:time 2283:nice 2278:kill 2237:type 2172:file 2096:Unix 2037:and 2004:1282 1951:OCLC 1941:ISBN 1922:ISBN 1891:ISBN 1864:2014 1836:ISBN 1657:ISBN 1502:2023 1426:OCLC 1416:ISBN 1375:ISBN 1340:ISBN 1291:ISBN 1237:and 1175:(or 1171:The 1134:down 1091:rwho 1083:rwho 1073:rwho 1035:and 982:rshd 868:via 830:and 824:rshd 798:and 746:rwho 702:rshd 652:rshd 631:Refs 621:Port 587:rwho 551:copy 536:Unix 502:Unix 490:Unix 476:The 386:IGMP 366:ICMP 324:QUIC 319:RSVP 314:SCTP 309:DCCP 274:XMPP 254:SNMP 249:SMTP 234:RTSP 209:OSPF 199:NNTP 194:MQTT 189:MGCP 184:LDAP 174:IMAP 159:HTTP 139:DHCP 87:Type 78:and 76:Unix 2659:cal 2618:lex 2590:man 2465:sed 2385:cut 2365:awk 2344:who 2309:env 2227:tee 2207:pwd 2202:pax 2147:cmp 2117:cat 2000:RFC 1483:doi 1395:346 1243:SSH 1162:rsh 1150:rcp 1079:who 1067:rcp 1063:rsh 1055:rcp 1041:rcp 1037:rcp 1031:of 1025:rcp 1020:rcp 994:rsh 975:rsh 951:rsh 935:rsh 924:rsh 874:TCP 820:rsh 800:rsh 769:rsh 765:rcp 739:UDP 736:513 723:UDP 708:TCP 705:514 699:rsh 692:TCP 689:513 676:TCP 673:512 658:TCP 655:514 649:rcp 593:). 591:who 577:), 571:rsh 569:), 561:), 553:), 547:rcp 531:). 484:of 431:MAC 426:PPP 416:ARP 381:ECN 376:NDP 304:UDP 299:TCP 259:SSH 244:SIP 239:RIP 229:RTP 219:PTP 214:POP 204:NTP 179:IRC 154:FTP 149:DNS 134:BGP 107:BSD 2743:: 2674:od 2669:lp 2654:bc 2628:nm 2608:ar 2533:cd 2505:wc 2500:vi 2485:tr 2440:nl 2430:m4 2405:ex 2400:ed 2288:ps 2273:fg 2263:bg 2258:at 2212:rm 2197:mv 2187:ls 2182:ln 2167:df 2162:du 2157:dd 2152:cp 1984:. 1949:. 1916:. 1885:. 1809:. 1778:^ 1742:. 1713:. 1701:^ 1685:. 1651:. 1624:. 1600:. 1562:^ 1546:. 1535:^ 1518:. 1489:. 1481:. 1477:. 1424:. 1410:. 1369:. 1338:. 1328:. 1311:^ 1285:. 1253:. 1156:, 1152:, 1065:, 1059:cp 1053:, 1051:cp 1033:cp 1012:. 996:, 949:. 908:, 826:. 581:, 370:v6 359:v6 354:v4 349:IP 143:v6 2088:e 2081:t 2074:v 1957:. 1930:. 1866:. 1844:. 1819:. 1795:. 1772:. 1752:. 1728:. 1695:. 1634:. 1610:. 1556:. 1529:. 1504:. 1485:: 1459:. 1438:. 1354:. 1225:. 980:( 465:e 458:t 451:v 372:) 368:( 165:) 145:) 141:( 64:) 20:)

Index

Rlogin
Developer(s)
Computer Systems Research Group
University of California, Berkeley
Operating system
Unix
Unix-like
Type
Command
suite
License
BSD
Internet protocol suite
Application layer
BGP
DHCP
v6
DNS
FTP
HTTP
HTTP/3
HTTPS
IMAP
IRC
LDAP
MGCP
MQTT
NNTP
NTP
OSPF

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.