Factbites
 Where results make sense
About us   |   Why use us?   |   Reviews   |   PR   |   Contact us  

Topic: Rlogin


In the News (Wed 26 Jun 19)

  
  rlogin VB.NET | rlogin ASP.NET | rlogin C# | rlogin .NET Component | rlogin Delphi
Use the Rlogin.NET component to easily login to a remote host using rlogin.
Stream interface enables advanced read/write capabilities such as reading to a delimiter.
Initialize a new instance of the Rlogin class.
www.dart.com /ctl_telnetrlogin.aspx   (579 words)

  
  Telnet/tn3270/rlogin URL
Rlogin connections are "sometimes" possible using the rlogin URL.
You will be prompted for a password, unless one is not required.
Current browsers emulate rlogin URLs using a telnet client.
www.utoronto.ca /webdocs/HTMLdocs/NewHTML/url_telnet.html   (106 words)

  
  Rlogin   (Site not responding. Last check: )
RFC 1258, in which it was defined, states that: "[t]he rlogin facility provides a remote-echoed, locally flow-controlled virtual terminal with proper flushing of output." rlogin communicates with a daemon, rlogind, on the remote host.
rlogin is similar to the Telnet command, but has the disadvantage of not being as customizable and being able to connect only to Unix hosts.
Due to these serious problems rlogin was rarely used across untrusted networks (like the public internet) and even in closed deployments it has fallen into relative disuse (with many Unix and Linux distributions no longer including it by default).
www.serebella.com /encyclopedia/article-Rlogin.html   (657 words)

  
 comp.sources.unix::devel/rlogin.fix   (Site not responding. Last check: )
Performance improvement results from reducing the involvement of the agent processes (rlogin and rlogind) in the task of passing characters between the client and server hosts.
In this implementation, the agent processes retain their previous function of establishing an rlogin-style connection between two hosts; however, once the connection is established, the agents sleep until the connection is interrrupted by an escape character on the client host, or terminated by either host.
The character-switching functions formerly performed by rlogin and rlogind are now handled entirely within kernel interrupt logic, eliminating the delays and scheduling overhead of the original implementation and improving response and throughput.
www.isc.org /sources/devel/rlogin.fix.php   (235 words)

  
 UNIX man pages : rlogin ()
In non-secure or traditional environment, rlogin allows a user to log in on an equivalent remote host, rhost, bypassing the normal login/password sequence, in a manner similar to the remsh command (see remsh(1)).
If rlogin is run from a shell that supports job control (see csh(1), ksh(1), and sh-posix(1)), escape sequences can be used to suspend rlogin.
rlogin is unable to transmit the Break key as an interrupt signal to the remote system, regardless of whether the user has set stty brkint on the local system.
falcon.jmu.edu /cgi-bin/man-cgi?rlogin   (1774 words)

  
 Online Man Page
The rlogin utility establishes a remote login session from your terminal to the remote machine named hostname.
If this authorization fails, fallback to normal rlogin using rhosts will occur only if the -PO option is used explicitly on the command line or is specified in krb5.conf(4).
For the non-secure rlogin session, each remote machine may have a file named /etc/hosts.equiv containing a list of trusted host names with which it shares user names.
www.cs.duke.edu /csl/docs/man.php?section=1&topic=rlogin   (1418 words)

  
 rlogin: Remote Login in Unix systems Overview
rlogin (remote login) is a Unix command that allows an authorized user to login to other UNIX machines (hosts) on a network and to interact as if the user were physically at the host computer.
A secure version of rlogin (slogin) was combined with two other UNIX utility, ssh and scp, in the Secure Shell suite, an interface and protocol created to replace the earlier utilities.
Otherwise, unless the start and stop characters on the remote host are not Ctrl-S and Ctrl-Q, the rlogin command uses a 7-bit data path and parity bits are stripped.
www.networkdictionary.com /protocols/rlogin.php   (558 words)

  
 rlogin
Rlogin connects your terminal on the current local host system lhost to the remote host system rhost.
The version built to use Kerberos authentication is very similar to the standard Berkeley rlogin(1), except that instead of the rhosts mecha- nism, it uses Kerberos authentication to determine the authorization to use a remote account.
-k request rlogin to obtain tickets for the remote host in realm realm instead of the remote host’s realm as determined by krb_realmofhost(3).
gd.tuwien.ac.at /linuxcommand.org/man_pages/rlogin1.html   (678 words)

  
 in.rlogind(1M)   (Site not responding. Last check: )
The corresponding FMRI entries are: svc:/network/login:klogin (rlogin with kerberos) svc:/network/login:eklogin (rlogin with kerberos and encryption)
rlogin auth sufficient pam_rhosts_auth.so.1 rlogin auth requisite pam_authtok_get.so.1 rlogin auth required pam_dhkeys.so.1 rlogin auth required pam_unix_auth.so.1 rlogin account required pam_unix_roles.so.1 rlogin account required pam_unix_projects.so.1 rlogin account required pam_unix_account.so.1 rlogin session required pam_unix_session.so.1 With this configuration, the server checks the client's source address.
The in.rlogind service is managed by the service management facility, smf(5), under the service identifier: svc:/network/login:rlogin (rlogin) svc:/network/login:klogin (rlogin with kerberos) svc:/network/login:eklogin (rlogin with kerberos and encryption) Administrative actions on this service, such as enabling, disabling, or requesting restart, can be performed using svcadm(1M).
www.cs.duke.edu /cgi-bin/man.cgi?section=1M&topic=in.rlogind   (1133 words)

  
 Chapter 26. Telnet and Rlogin: Remote Login   (Site not responding. Last check: )
Rlogin is from Berkeley Unix and was developed to work between Unix systems only, but it has been ported to other operating systems also.
The Rlogin commands from the server to the client, which we described in Figure 26.4, are termed out-of-band signaling since the technique used is called "out-of-band data" by most APIs.
This is the type of interactive traffic we saw in Section 19.2 with Rlogin: one character at a time sent by the client, with the server performing the echo.
www.vsi.ru /library/Networking/TCPIPIllustrated/telnet.htm   (9015 words)

  
 rlogin - remote logi   (Site not responding. Last check: )
The rlogin utility establishes a remote login session fromyour terminal to the remote machine named hostname.
For the kerberized rlogin session, each user may have aprivate authorization list in a file,.k5login, in his homedirectory.
For the non-secure rlogin session, each remote machine mayhave a file named /etc/hosts.equiv containing a list oftrusted host names with which it shares user names.
www.fh-augsburg.de /cgi-bin/man2html?rlogin[1]   (1317 words)

  
 Root Access through rlogin
RLOGIN allows an authorized user to log in to other UNIX or Linux machines on a network by starting a terminal session on the remote host.
RLOGIN uses the standard rhosts authorization mechanism, and is enabled by default on many Unix and Linux machines.
Therefore, attempts to RLOGIN using -froot as the user name, are suspicious and should be monitored.
www.juniper.net /security/auto/vulnerabilities/vuln128.html   (200 words)

  
 SANS Institute - Intrusion Detection FAQ: Does allowing telnet and rlogin increase the risk to my site?
rlogin is part of the r-command package that also includes rsh and rexec.
Newer versions of rlogin also exist that employ authentication and encryption, and if yours is compiled with that support, you are highly encouraged to use it.
Regardless, if you allow rlogin connections you should wrap ALL your r-commands started in /etc/inetd.confwith a wrapper program like TCPWrappers and discourage the use of.rhosts, maybe even setting up a script to prune.rhosts files from your system on an hourly basis.
www.sans.org /resources/idfaq/telnet_rlogin.php   (1032 words)

  
 Unix man pages: rlogin (1)   (Site not responding. Last check: )
This specification may be as a literal character, or as an octal value in the form \nnn.
Similarly, the line ``^Z'' will suspend the rlogin session, and ``'' suspends the send portion of the rlogin, but allows output from the remote system.
BUGS Rlogin will be replaced by telnet(1) in the near future.
www.rt.com /man/rlogin.1.html   (495 words)

  
 Kerberized rsh and rlogin - Shishi
Differences between rlogin an rsh will be explained, like those between v0.1 and v0.2 of the protocol for compatibility reasons.
Warning: If you are seriously considering using Kerberos rsh or rlogin, instead of more robust remote access protocols such as SSH, you may first want to explore http://www.cs.berkeley.edu/~hildrum/kerberos/ and the full paper at http://www.cs.berkeley.edu/~hildrum/043.pdf.
For rlogin protocol, when authentication is complete, the server can optionnaly send a message to ask for window terminal size of user.
www.gnu.org /software/shishi/manual/html_node/Kerberized-rsh-and-rlogin.html   (1427 words)

  
 What is rlogin? - a definition from Whatis.com
- Rlogin (remote login) is a Unix command that allows an authorized user to login to other UNIX machines (hosts) on a network and to interact as if the user were physically at the host computer.
Rlogin is similar to the better known Telnet command.
A benefit of rlogin is the ability to use a file called.rhosts that resides on the host machine and maintains a list of terminals allowed to login without a password.
searchnetworking.techtarget.com /sDefinition/0,,sid7_gci214597,00.html   (242 words)

  
 rlogin(1)
NAME rlogin - Connects the local host with a remote host SYNOPSIS rlogin [-8L] [-e character] [-l user] remote_host The remote login command (rlogin) logs into remote_host and connects your local terminal to the remote host.
Otherwise, unless the Stop and Continue key sequences on the remote host are not standard, rlogin uses a 7-bit data path and the eighth (high) bit of each byte is stripped.
To log in to a remote host with a different username, enter: $ rlogin host2 -l dale You are prompted to enter your password and then are logged in to the remote host host2 with the username dale.
www.uwm.edu /cgi-bin/IMT/wwwman?topic=rlogin(1)&msection=3   (757 words)

  
 rlogin(1) manual page   (Site not responding. Last check: )
The version built to use Kerberos authentication is very similar to the standard Berkeley rlogin(1), except that instead of the rhosts mechanism, it uses Kerberos authentication to determine the authorization to use a remote account.
The -L option allows the rlogin session to be run in litout mode.
This is now the default; -flow enables local handling of ^S/^Q. The -k option requests rlogin to obtain tickets for the remote host in realm realm instead of the remote host's realm as determined by krb_realmofhost(3).
www-personal.engin.umich.edu /~backup/newdocs/rlogin.html   (684 words)

  
 [No title]
Rlogin connects your terminal on the current local host sys- tem lhost to the remote host system rhost.
The version built to use Kerberos authentication is very similar to the standard Berkeley rlogin(1), except that instead of the rhosts mechanism, it uses Kerberos authenti- cation to determine the authorization to use a remote account.
If there is some problem in marshaling the Kerberos authen- tication information, an error message is printed and the standard UCB rlogin is executed in place of the Kerberos rlogin.
www.ncsa.uiuc.edu /UserInfo/Resources/Software/kerberos/man/rlogin.1.html   (584 words)

  
 97-0492: CERT CA-97.06 - Vulnerability in rlogin/term
The protocol described in RFC 1282 explains how this terminal information is transferred from the local machine where the rlogin client program is running to the remote machine where service is sought.
Unfortunately, many implementations of the rlogin program contain a defect whereby the value of the TERM environment variable is copied to an internal buffer without due care.
rlogin requires these increased privileges so it can allocate a port in the required range, as described in the in.rlogind (or rlogind) manual page: "The server checks the client's source port.
www.stanford.edu /group/itss-ccs/security/Advisories/97-0492.html   (1279 words)

  
 [No title]
Kantor [Page 2] RFC 1258 BSD Rlogin September 1991 From Server to Client Data from the remote server is sent to the client as a stream of characters.
A Cautionary Tale The rlogin protocol (as commonly implemented) allows a user to set up a class of trusted users and/or hosts which will be allowed to log on as himself without the entry of a password.
If one wishes to use the password-bypass facilities of the rlogin service, it is essential to realize the compromises that may be possible thereby.
www.ietf.org /rfc/rfc1258.txt   (1161 words)

  
 rlogin
Rlogin starts a terminal session on a remote host host.
-L The -L option allows the rlogin session to be run in ''litout'' (see tty(4)) mode.
Rlogin will be replaced by telnet(1) in the near future.
www.ctssn.com /man/man.cgi?rlogin   (285 words)

  
 hpux rlogin.1   (Site not responding. Last check: )
In a manner similar to remsh(1), rlogin allows a user to log in on an equivalent remote host, rhost, bypassing the normal login/password sequence.
RETURN VALUES rlogin sends an error message to stderr and returns a non-zero value if an error occurs before the connection to the remote host is completed; otherwise it returns a zero.
Hewlett-Packard Company - 3 - HP-UX Release 9.0: August 1992 rlogin(1) rlogin(1) rlogin is unable to transmit the Break key as an interrupt signal to the remote system, regardless of whether the user has done stty brkint on the local system.
www.informatik.uni-frankfurt.de /doc/man/hpux/rlogin.1.html   (1030 words)

  
 Rlogin - Protocolinfo
rlogin is a remote login protocol defined in RFC 1282.
Because of its lack of security, rlogin is generally not used anymore in favor of SSH.
rlogin servers usually run on TCP port 513.
www.protocolinfo.org /wiki/Rlogin   (43 words)

  
 UNIX-Style Syntax for rlogin Connections
The previous EXEC level rlogin command allowed remote users to log in using the /user username option, which was not compatible with the standard UNIX rlogin -l username option.
If your preferred transport is set to rlogin, you can use the connect command in place of the rlogin command.
When your preferred transport is set to none or to another protocol, you must use the rlogin command to connect to a host.
www.cisco.com /univercd/cc/td/doc/product/software/ios113ed/113t/113t_3/fmrlogin.htm   (673 words)

  
 [No title]
The version built to use Kerberos authentication is very similar to the standard Berkeley rlogin(1), except that instead of the rhosts mechanism, it uses Kerberos authen- tication to determine the authorization to use a remote account.
Similarly, the line ``~^Z'' (where ^Z, control-Z, is the suspend charac- ter) will suspend the rlogin session.
The termi- nal or window size is also copied to the remote system if the server supports the option, and changes in size are reflected as well.
www.mallorn.com /customer/resources/kerberos/man/rlogin.html   (572 words)

  
 rlogin(1)   (Site not responding. Last check: )
The rlogin utility starts a terminal session on a remote host host.
-k The -k option requests rlogin to obtain tickets for the remote host in realm realm instead of the remote host's realm as determined by krb_realmofhost(3).
The rlogin utility will be replaced by telnet(1) in the near future.
www.bernstein-plus-sons.com /cgi-sys/cgiwrap/yaya/man.cgi?section=1&topic=rlogin   (432 words)

  
 The TCP/IP Guide - Berkeley Remote Login (rlogin)
In contrast, rlogin was intended for that specific purpose, and this is reflected in its operation.
The protocol requires rlogin server software to be running on the host that is going to allow remote access; it is usually called rlogind (for rlogin daemon, the latter word being the standard UNIX term for a background server process).
A user who wants to remotely log in to the server runs the rlogin command on his or her local host, and specifies the name of the server.
www.tcpipguide.com /free/t_BerkeleyRemoteLoginrlogin.htm   (573 words)

Try your search on: Qwika (all wikis)

Factbites
  About us   |   Why use us?   |   Reviews   |   Press   |   Contact us  
Copyright © 2005-2007 www.factbites.com Usage implies agreement with terms.