1994-05-27 12:39:25 +00:00
|
|
|
.\" Copyright (c) 1983, 1989, 1991, 1993
|
|
|
|
.\" The Regents of the University of California. All rights reserved.
|
|
|
|
.\"
|
|
|
|
.\" Redistribution and use in source and binary forms, with or without
|
|
|
|
.\" modification, are permitted provided that the following conditions
|
|
|
|
.\" are met:
|
|
|
|
.\" 1. Redistributions of source code must retain the above copyright
|
|
|
|
.\" notice, this list of conditions and the following disclaimer.
|
|
|
|
.\" 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
.\" notice, this list of conditions and the following disclaimer in the
|
|
|
|
.\" documentation and/or other materials provided with the distribution.
|
|
|
|
.\" 3. All advertising materials mentioning features or use of this software
|
|
|
|
.\" must display the following acknowledgement:
|
|
|
|
.\" This product includes software developed by the University of
|
|
|
|
.\" California, Berkeley and its contributors.
|
|
|
|
.\" 4. Neither the name of the University nor the names of its contributors
|
|
|
|
.\" may be used to endorse or promote products derived from this software
|
|
|
|
.\" without specific prior written permission.
|
|
|
|
.\"
|
|
|
|
.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
|
|
|
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
|
|
|
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
|
|
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
|
|
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
|
|
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
.\" SUCH DAMAGE.
|
|
|
|
.\"
|
|
|
|
.\" @(#)rshd.8 8.1 (Berkeley) 6/4/93
|
1999-08-28 00:22:10 +00:00
|
|
|
.\" $FreeBSD$
|
1994-05-27 12:39:25 +00:00
|
|
|
.\"
|
|
|
|
.Dd June 4, 1993
|
|
|
|
.Dt RSHD 8
|
2001-07-10 10:49:54 +00:00
|
|
|
.Os
|
1994-05-27 12:39:25 +00:00
|
|
|
.Sh NAME
|
|
|
|
.Nm rshd
|
|
|
|
.Nd remote shell server
|
|
|
|
.Sh SYNOPSIS
|
2000-11-20 14:42:24 +00:00
|
|
|
.Nm
|
2001-02-02 03:29:09 +00:00
|
|
|
.Op Fl \&?DLaln
|
1994-05-27 12:39:25 +00:00
|
|
|
.Sh DESCRIPTION
|
|
|
|
The
|
1997-12-02 12:30:04 +00:00
|
|
|
.Nm
|
2002-07-06 19:19:48 +00:00
|
|
|
utility
|
2001-07-15 07:53:42 +00:00
|
|
|
is the server for the
|
1994-05-27 12:39:25 +00:00
|
|
|
.Xr rcmd 3
|
|
|
|
routine and, consequently, for the
|
|
|
|
.Xr rsh 1
|
|
|
|
program. The server provides remote execution facilities
|
|
|
|
with authentication based on privileged port numbers from trusted hosts.
|
|
|
|
.Pp
|
|
|
|
The
|
1997-12-02 12:30:04 +00:00
|
|
|
.Nm
|
2002-07-06 19:19:48 +00:00
|
|
|
utility listens for service requests at the port indicated in
|
2000-01-07 13:14:32 +00:00
|
|
|
the
|
|
|
|
.Dq cmd
|
|
|
|
service specification; see
|
1994-05-27 12:39:25 +00:00
|
|
|
.Xr services 5 .
|
|
|
|
When a service request is received the following protocol
|
|
|
|
is initiated:
|
|
|
|
.Bl -enum
|
|
|
|
.It
|
|
|
|
The server checks the client's source port.
|
|
|
|
If the port is not in the range 512-1023, the server
|
|
|
|
aborts the connection.
|
|
|
|
.It
|
|
|
|
The server reads characters from the socket up
|
1997-12-02 12:30:04 +00:00
|
|
|
to a
|
|
|
|
.Tn NUL
|
|
|
|
(`\e0') byte. The resultant string is
|
1994-05-27 12:39:25 +00:00
|
|
|
interpreted as an
|
|
|
|
.Tn ASCII
|
|
|
|
number, base 10.
|
|
|
|
.It
|
|
|
|
If the number received in step 2 is non-zero,
|
|
|
|
it is interpreted as the port number of a secondary
|
2001-07-15 07:53:42 +00:00
|
|
|
stream to be used for the
|
1994-05-27 12:39:25 +00:00
|
|
|
.Em stderr .
|
|
|
|
A second connection is then created to the specified
|
|
|
|
port on the client's machine. The source port of this
|
|
|
|
second connection is also in the range 512-1023.
|
|
|
|
.It
|
|
|
|
The server checks the client's source address
|
|
|
|
and requests the corresponding host name (see
|
|
|
|
.Xr gethostbyaddr 3 ,
|
|
|
|
.Xr hosts 5
|
|
|
|
and
|
2000-01-07 13:14:32 +00:00
|
|
|
.Xr named 8 ) .
|
1998-12-16 07:20:45 +00:00
|
|
|
If the hostname cannot be determined or the hostname and address do
|
|
|
|
not match after verification,
|
1994-05-27 12:39:25 +00:00
|
|
|
the dot-notation representation of the host address is used.
|
|
|
|
.It
|
|
|
|
A null terminated user name of at most 16 characters
|
|
|
|
is retrieved on the initial socket. This user name
|
|
|
|
is interpreted as the user identity on the
|
|
|
|
.Em client Ns 's
|
|
|
|
machine.
|
|
|
|
.It
|
|
|
|
A null terminated user name of at most 16 characters
|
|
|
|
is retrieved on the initial socket. This user name
|
|
|
|
is interpreted as a user identity to use on the
|
1996-07-23 12:21:46 +00:00
|
|
|
.Em server Ns 's
|
1994-05-27 12:39:25 +00:00
|
|
|
machine.
|
|
|
|
.It
|
|
|
|
A null terminated command to be passed to a
|
|
|
|
shell is retrieved on the initial socket. The length of
|
|
|
|
the command is limited by the upper bound on the size of
|
2001-07-15 07:53:42 +00:00
|
|
|
the system's argument list.
|
1994-05-27 12:39:25 +00:00
|
|
|
.It
|
2002-07-06 19:19:48 +00:00
|
|
|
The
|
|
|
|
.Nm
|
|
|
|
utility then validates the user using
|
1994-05-27 12:39:25 +00:00
|
|
|
.Xr ruserok 3 ,
|
|
|
|
which uses the file
|
|
|
|
.Pa /etc/hosts.equiv
|
|
|
|
and the
|
|
|
|
.Pa .rhosts
|
|
|
|
file found in the user's home directory. The
|
|
|
|
.Fl l
|
|
|
|
option prevents
|
|
|
|
.Xr ruserok 3
|
1997-12-02 12:30:04 +00:00
|
|
|
from doing any validation based on the user's
|
|
|
|
.Pa .rhosts
|
|
|
|
file,
|
1994-05-27 12:39:25 +00:00
|
|
|
unless the user is the superuser.
|
|
|
|
.It
|
1997-12-02 12:30:04 +00:00
|
|
|
A
|
|
|
|
.Tn NUL
|
|
|
|
byte is returned on the initial socket
|
1994-05-27 12:39:25 +00:00
|
|
|
and the command line is passed to the normal login
|
|
|
|
shell of the user. The
|
|
|
|
shell inherits the network connections established
|
|
|
|
by
|
2000-11-20 14:42:24 +00:00
|
|
|
.Nm .
|
1994-05-27 12:39:25 +00:00
|
|
|
.El
|
|
|
|
.Pp
|
2001-02-02 03:29:09 +00:00
|
|
|
The options are as follows:
|
|
|
|
.Bl -tag -width indent
|
|
|
|
.It Fl \&?
|
|
|
|
Display the usage message, and exit.
|
|
|
|
.It Fl D
|
|
|
|
Sets the TCP_NODELAY socket option, which improves the performance
|
|
|
|
of small back-to-back writes at the expense of additional network
|
|
|
|
traffic.
|
|
|
|
.It Fl L
|
|
|
|
Causes all successful accesses to be logged to
|
1994-05-27 12:39:25 +00:00
|
|
|
.Xr syslogd 8
|
|
|
|
as
|
|
|
|
.Li auth.info
|
|
|
|
messages.
|
2001-02-02 03:29:09 +00:00
|
|
|
.It Fl a
|
|
|
|
This flag is ignored, and is present for compatability purposes.
|
|
|
|
.It Fl l
|
|
|
|
Do not use the user's
|
|
|
|
.Pa .rhosts
|
|
|
|
file for authentication, unless the user is the superuser.
|
|
|
|
.It Fl n
|
|
|
|
Turn off transport level keepalive messages. This will prevent sessions
|
|
|
|
from timing out if the client crashes or becomes unreachable.
|
|
|
|
.El
|
1994-05-27 12:39:25 +00:00
|
|
|
.Sh DIAGNOSTICS
|
|
|
|
Except for the last one listed below,
|
|
|
|
all diagnostic messages
|
|
|
|
are returned on the initial socket,
|
|
|
|
after which any network connections are closed.
|
|
|
|
An error is indicated by a leading byte with a value of
|
|
|
|
1 (0 is returned in step 10 above upon successful completion
|
|
|
|
of all the steps prior to the execution of the login shell).
|
|
|
|
.Bl -tag -width indent
|
|
|
|
.It Sy Locuser too long.
|
|
|
|
The name of the user on the client's machine is
|
|
|
|
longer than 16 characters.
|
|
|
|
.It Sy Ruser too long.
|
|
|
|
The name of the user on the remote machine is
|
|
|
|
longer than 16 characters.
|
1997-12-18 07:39:27 +00:00
|
|
|
.It Sy Command too long.
|
1994-05-27 12:39:25 +00:00
|
|
|
The command line passed exceeds the size of the argument
|
|
|
|
list (as configured into the system).
|
|
|
|
.It Sy Login incorrect.
|
1997-07-18 21:04:19 +00:00
|
|
|
No password file entry for the user name existed
|
|
|
|
or the authentication procedure described above failed.
|
1994-05-27 12:39:25 +00:00
|
|
|
.It Sy Remote directory.
|
2001-07-15 07:53:42 +00:00
|
|
|
The
|
1997-12-02 12:30:04 +00:00
|
|
|
.Xr chdir 2
|
|
|
|
function to the home directory failed.
|
1997-04-23 03:06:47 +00:00
|
|
|
.It Sy Logins not available right now.
|
1997-12-02 12:30:04 +00:00
|
|
|
.Xr Rsh 1
|
|
|
|
was attempted outside the allowed hours defined in
|
|
|
|
.Pa /etc/login.conf
|
|
|
|
for the local user's login class.
|
1994-05-27 12:39:25 +00:00
|
|
|
.It Sy Can't make pipe.
|
2001-07-15 07:53:42 +00:00
|
|
|
The pipe needed for the
|
1994-05-27 12:39:25 +00:00
|
|
|
.Em stderr ,
|
|
|
|
wasn't created.
|
2001-07-15 07:53:42 +00:00
|
|
|
.It Sy Can't fork; try again.
|
1994-05-27 12:39:25 +00:00
|
|
|
A
|
1997-12-02 12:30:04 +00:00
|
|
|
.Xr fork 2
|
1994-05-27 12:39:25 +00:00
|
|
|
by the server failed.
|
|
|
|
.It Sy <shellname>: ...
|
|
|
|
The user's login shell could not be started. This message is returned
|
|
|
|
on the connection associated with the
|
|
|
|
.Em stderr ,
|
|
|
|
and is not preceded by a flag byte.
|
|
|
|
.El
|
|
|
|
.Sh SEE ALSO
|
1996-01-28 23:57:38 +00:00
|
|
|
.Xr rlogin 1 ,
|
1997-01-13 00:25:51 +00:00
|
|
|
.Xr rsh 1 ,
|
|
|
|
.Xr gethostbyaddr 3 ,
|
1994-05-27 12:39:25 +00:00
|
|
|
.Xr rcmd 3 ,
|
1996-01-28 23:57:38 +00:00
|
|
|
.Xr ruserok 3 ,
|
2000-01-07 13:14:32 +00:00
|
|
|
.Xr auth.conf 5 ,
|
1996-01-28 23:57:38 +00:00
|
|
|
.Xr hosts 5 ,
|
2001-07-06 16:46:48 +00:00
|
|
|
.Xr hosts.equiv 5 ,
|
1997-04-23 03:06:47 +00:00
|
|
|
.Xr login.conf 5 ,
|
1997-01-13 00:25:51 +00:00
|
|
|
.Xr services 5 ,
|
1996-01-28 23:57:38 +00:00
|
|
|
.Xr named 8 ,
|
|
|
|
.Xr rlogind 8 ,
|
2000-11-15 17:27:54 +00:00
|
|
|
.Xr syslogd 8
|
1996-01-28 23:57:38 +00:00
|
|
|
.Sh FILES
|
2001-04-04 10:33:13 +00:00
|
|
|
.Bl -tag -width /var/run/nologin -compact
|
1996-01-28 23:57:38 +00:00
|
|
|
.It Pa /etc/hosts
|
|
|
|
.It Pa /etc/hosts.equiv
|
1997-12-02 12:30:04 +00:00
|
|
|
.It Pa /etc/login.conf
|
2001-02-01 16:38:02 +00:00
|
|
|
.It Ev $HOME Ns Pa /.rhosts
|
2001-04-04 10:33:13 +00:00
|
|
|
.Pp
|
2001-03-27 19:40:51 +00:00
|
|
|
.It Pa /etc/pam.conf
|
|
|
|
.Nm
|
2002-06-26 17:09:08 +00:00
|
|
|
uses
|
2001-03-27 19:40:51 +00:00
|
|
|
.Pa /etc/pam.conf
|
|
|
|
entries with service name
|
|
|
|
.Dq rsh .
|
2001-04-04 10:33:13 +00:00
|
|
|
Authentication modules requiring passwords (such as
|
2001-03-27 19:40:51 +00:00
|
|
|
.Nm pam_unix )
|
2001-04-04 10:33:13 +00:00
|
|
|
are not supported.
|
1996-01-28 23:57:38 +00:00
|
|
|
.El
|
1994-05-27 12:39:25 +00:00
|
|
|
.Sh BUGS
|
|
|
|
The authentication procedure used here assumes the integrity
|
|
|
|
of each client machine and the connecting medium. This is
|
2000-01-07 13:14:32 +00:00
|
|
|
insecure, but is useful in an
|
|
|
|
.Dq open
|
|
|
|
environment.
|
1994-05-27 12:39:25 +00:00
|
|
|
.Pp
|
|
|
|
A facility to allow all data exchanges to be encrypted should be
|
|
|
|
present.
|
|
|
|
.Pp
|
|
|
|
A more extensible protocol (such as Telnet) should be used.
|
2000-01-25 14:52:10 +00:00
|
|
|
.Sh HISTORY
|
|
|
|
IPv6 support was added by WIDE/KAME project.
|