188 lines
4.9 KiB
Groff
188 lines
4.9 KiB
Groff
.\" Copyright (c) 1983, 1990, 1993
|
|
.\" The Regents of the University of California. All rights reserved.
|
|
.\"
|
|
.\" Redistribution and use in source and binary forms, with or without
|
|
.\" modification, are permitted provided that the following conditions
|
|
.\" are met:
|
|
.\" 1. Redistributions of source code must retain the above copyright
|
|
.\" notice, this list of conditions and the following disclaimer.
|
|
.\" 2. Redistributions in binary form must reproduce the above copyright
|
|
.\" notice, this list of conditions and the following disclaimer in the
|
|
.\" documentation and/or other materials provided with the distribution.
|
|
.\" 3. All advertising materials mentioning features or use of this software
|
|
.\" must display the following acknowledgement:
|
|
.\" This product includes software developed by the University of
|
|
.\" California, Berkeley and its contributors.
|
|
.\" 4. Neither the name of the University nor the names of its contributors
|
|
.\" may be used to endorse or promote products derived from this software
|
|
.\" without specific prior written permission.
|
|
.\"
|
|
.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
|
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
|
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
.\" SUCH DAMAGE.
|
|
.\"
|
|
.\" @(#)rsh.1 8.1 (Berkeley) 6/6/93
|
|
.\"
|
|
.Dd June 6, 1993
|
|
.Dt RSH 1
|
|
.Os BSD 4.2
|
|
.Sh NAME
|
|
.Nm rsh
|
|
.Nd remote shell
|
|
.Sh SYNOPSIS
|
|
.Nm rsh
|
|
.Op Fl Kdnx
|
|
.Op Fl k Ar realm
|
|
.Op Fl l Ar username
|
|
.Ar host
|
|
.Op command
|
|
.Sh DESCRIPTION
|
|
.Nm Rsh
|
|
executes
|
|
.Ar command
|
|
on
|
|
.Ar host .
|
|
.Pp
|
|
.Nm Rsh
|
|
copies its standard input to the remote command, the standard
|
|
output of the remote command to its standard output, and the
|
|
standard error of the remote command to its standard error.
|
|
Interrupt, quit and terminate signals are propagated to the remote
|
|
command;
|
|
.Nm rsh
|
|
normally terminates when the remote command does.
|
|
The options are as follows:
|
|
.Bl -tag -width flag
|
|
.It Fl K
|
|
The
|
|
.Fl K
|
|
option turns off all Kerberos authentication.
|
|
.It Fl d
|
|
The
|
|
.Fl d
|
|
option turns on socket debugging (using
|
|
.Xr setsockopt 2 )
|
|
on the
|
|
.Tn TCP
|
|
sockets used for communication with the remote host.
|
|
.It Fl k
|
|
The
|
|
.Fl k
|
|
option causes
|
|
.Nm rsh
|
|
to obtain tickets for the remote host in
|
|
.Ar realm
|
|
instead of the remote host's realm as determined by
|
|
.Xr krb_realmofhost 3 .
|
|
.It Fl l
|
|
By default, the remote username is the same as the local username.
|
|
The
|
|
.Fl l
|
|
option allows the remote name to be specified.
|
|
Kerberos authentication is used, and authorization is determined
|
|
as in
|
|
.Xr rlogin 1 .
|
|
.It Fl n
|
|
The
|
|
.Fl n
|
|
option redirects input from the special device
|
|
.Pa /dev/null
|
|
(see the
|
|
.Sx BUGS
|
|
section of this manual page).
|
|
.It Fl x
|
|
The
|
|
.Fl x
|
|
option turns on
|
|
.Tn DES
|
|
encryption for all data exchange.
|
|
This may introduce a significant delay in response time.
|
|
.El
|
|
.Pp
|
|
If no
|
|
.Ar command
|
|
is specified, you will be logged in on the remote host using
|
|
.Xr rlogin 1 .
|
|
.Pp
|
|
Shell metacharacters which are not quoted are interpreted on local machine,
|
|
while quoted metacharacters are interpreted on the remote machine.
|
|
For example, the command
|
|
.Pp
|
|
.Dl rsh otherhost cat remotefile >> localfile
|
|
.Pp
|
|
appends the remote file
|
|
.Ar remotefile
|
|
to the local file
|
|
.Ar localfile ,
|
|
while
|
|
.Pp
|
|
.Dl rsh otherhost cat remotefile \&">>\&" other_remotefile
|
|
.Pp
|
|
appends
|
|
.Ar remotefile
|
|
to
|
|
.Ar other_remotefile .
|
|
.\" .Pp
|
|
.\" Many sites specify a large number of host names as commands in the
|
|
.\" directory /usr/hosts.
|
|
.\" If this directory is included in your search path, you can use the
|
|
.\" shorthand ``host command'' for the longer form ``rsh host command''.
|
|
.Sh FILES
|
|
.Bl -tag -width /etc/hosts -compact
|
|
.It Pa /etc/hosts
|
|
.El
|
|
.Sh SEE ALSO
|
|
.Xr rlogin 1 ,
|
|
.Xr setsockopt 2 ,
|
|
.Xr kerberos 3 ,
|
|
.Xr krb_sendauth 3 ,
|
|
.Xr krb_realmofhost 3 ,
|
|
.Xr rcmd 3 ,
|
|
.Xr ruserok 3 ,
|
|
.Xr hosts 5 ,
|
|
.Xr rshd 8 ,
|
|
.Xr rlogind 8 .
|
|
.Sh HISTORY
|
|
The
|
|
.Nm rsh
|
|
command appeared in
|
|
.Bx 4.2 .
|
|
.Sh BUGS
|
|
If you are using
|
|
.Xr csh 1
|
|
and put a
|
|
.Nm rsh
|
|
in the background without redirecting its input away from the terminal,
|
|
it will block even if no reads are posted by the remote command.
|
|
If no input is desired you should redirect the input of
|
|
.Nm rsh
|
|
to
|
|
.Pa /dev/null
|
|
using the
|
|
.Fl n
|
|
option.
|
|
.Pp
|
|
You cannot run an interactive command
|
|
(like
|
|
.Xr rogue 6
|
|
or
|
|
.Xr vi 1 )
|
|
using
|
|
.Nm rsh ;
|
|
use
|
|
.Xr rlogin 1
|
|
instead.
|
|
.Pp
|
|
Stop signals stop the local
|
|
.Nm rsh
|
|
process only; this is arguably wrong, but currently hard to fix for reasons
|
|
too complicated to explain here.
|