DOC HOME SITE MAP MAN PAGES GNU INFO SEARCH PRINT BOOK
 

rshd(ADMN)


rshd -- remote shell server

Syntax

/etc/rshd [ -k ] [ -K ] [ -X ]

Description

rshd is the network server for programs such as rcmd(TC) and rcp(TC), which need to execute a noninteractive shell on remote machines. rshd is started by the inetd ``super server'', and therefore must have an entry in the configuration file, /etc/inetd.conf. (See inetd(ADMN) and inetd.conf(SFF).)

By default rshd enforces an authentication procedure based on equivalence of user names (see hosts.equiv(SFF)). This procedure assumes all nodes on the network are equally secure.

Authenticated rcp and rcmd using Kerberos

rshd listens for service requests at the kshell port (544/tcp) as indicated in the login services specification (see services(SFF)). The kshell port accepts a connection from a remote authenticated rcmd or rcp client and establishes authentication with the client.

Authentication takes place between the client program (rcmd or rcp) and the host principal where the rshd service daemon is running using the network credentials of the user that invoked the client program. The principal name for host machine.subdomain.domain is

   host/machine.subdomain.domain
The machine name must be fully qualified (for example, kvetch.your_company.com). The service key for this host principal is cached in the local Default Service Key Table (/krb5/v5srvtab), and must match the service key stored in the Security Registry.

The following authentication options are supported:


-k
Relaxed authentication mode; if authentication cannot be established, a traditional unauthenticated connection is established.

-K
Strict authentication mode; if authentication cannot be established, no service is provided.

-X
Refuse service and print the message:
   rshd: Authentication is required on host: hostname

To execute commands on behalf of remote clients, the user invoking the client must have network credentials, and the user's principal name must appear in the $HOME/.k5login file on the host where rshd is running (this file must be writable only by the user or by root, and it must be readable by root on the filesystem where it resides).

Limitations

Authentication is based on Version 5 of the Kerberos Network Authentication Service protocol. Only this version of the protocol is supported.

Data encryption is not supported.

Files


/etc/hosts.equiv
list of equivalent hosts

/etc/inetd.conf
configuration file for inetd

/etc/services
Internet services list

/krb5/v5srvtab
local default service key table

$HOME/.k5login
access control file for the SCO Secure TCP/IP Utilities

See also

auth.config(ADMN), hosts.equiv(SFF), inetd(ADMN), inetd.conf(SFF), k5login(SFF), rcmd(TC), rcp(TC), services(SFF)

Standards conformance

Authenticated rshd is not part of any currently supported standard. It is an extension of AT&T UNIX System V provided by The Santa Cruz Operation, Inc.
© 2005 The SCO Group, Inc. All rights reserved.
SCO OpenServer Release 6.0.0 -- 02 June 2005