Welcome to Linux Knowledge Base and Tutorial
"The place where you learn linux"
International Medical Corps

 Create an AccountHome | Submit News | Your Account  

Tutorial Menu
Linux Tutorial Home
Table of Contents

· Introduction to Operating Systems
· Linux Basics
· Working with the System
· Shells and Utilities
· Editing Files
· Basic Administration
· The Operating System
· The X Windowing System
· The Computer Itself
· Networking
· System Monitoring
· Solving Problems
· Security
· Installing and Upgrading
· Linux and Windows

Glossary
MoreInfo
Man Pages
Linux Topics
Test Your Knowledge

Site Menu
Site Map
FAQ
Copyright Info
Terms of Use
Privacy Info
Disclaimer
WorkBoard
Thanks
Donations
Advertising
Masthead / Impressum
Your Account

Communication
Feedback
Forums
Private Messages
Surveys

Features
HOWTOs
News Archive
Submit News
Topics
User Articles
Web Links

Google
Google


The Web
linux-tutorial.info

Who's Online
There are currently, 185 guest(s) and 0 member(s) that are online.

You are an Anonymous user. You can register for free by clicking here

  

rlogin




DESCRIPTION

     Rlogin starts a terminal session on a remote host host.

     Rlogin first attempts to use the Kerberos authorization mechanism,
     described below.  If the remote host does not supporting Kerberos the
     standard Berkeley rhosts authorization mechanism is used.  The options
     are as follows:

     -8    The -8 option allows an eight-bit input data path at all times;
           otherwise parity bits are stripped except when the remote side's
           stop and start characters are other than ^S/^Q .

     -E    The -E option stops any character from being recognized as an
           escape character.  When used with the -8 option, this provides a
           completely transparent connection.

     -K    The -K option turns off all Kerberos authentication.

     -L    The -L option allows the rlogin session to be run in ``litout''
           (see tty(4)) mode.

     -d    The -d option turns on socket debugging (see setsockopt(2)) on the
           TCP sockets used for communication with the remote host.

     -e    The -e option allows user specification of the escape character,
           which is ``~'' by default.  This specification may be as a literal
           character, or as an octal value in the form \nnn.

     -k    The option requests rlogin to obtain tickets for the remote host in
           realm realm instead of the remote host's realm as determined by
           krb_realmofhost(3).

     -x    The -x option turns on DES encryption for all data passed via the
           rlogin session.  This may impact response time and CPU utilization,
           but provides increased security.

     A line of the form ``<escape char>.'' disconnects from the remote host.
     Similarly, the line ``<escape char>^Z'' will suspend the rlogin session,
     and ``<escape char><delayed-suspend char>'' suspends the send portion of
     the rlogin, but allows output from the remote system.  By default, the
     tilde (``~'') character is the escape character, and normally control-Y
     (``^Y'') is the delayed-suspend character.

     All echoing takes place at the remote site, so that (except for delays)
     the rlogin is transparent.  Flow control via ^S/^Q and flushing of input
     and output on interrupts are handled properly.


KERBEROS AUTHENTICATION

     Each user may have a private authorization list in the file .klogin in
     their home directory.  Each line in this file should contain a Kerberos
     principal name of the form principal.instance@realm.  If the originating


SEE ALSO

     rsh(1), kerberos(3), krb_sendauth(3), krb_realmofhost(3)


HISTORY

     The rlogin command appeared in 4.2BSD.


BUGS

     Rlogin will be replaced by telnet(1) in the near future.

     More of the environment should be propagated.

Linux NetKit (0.17)             August 15, 1999            Linux NetKit (0.17)
  




Login
Nickname

Password

Security Code
Security Code
Type Security Code


Don't have an account yet? You can create one. As a registered user you have some advantages like theme manager, comments configuration and post comments with your name.

Help if you can!


Amazon Wish List

Did You Know?
You can help in many different ways.


Friends



Tell a Friend About Us

Bookmark and Share



Web site powered by PHP-Nuke

Is this information useful? At the very least you can help by spreading the word to your favorite newsgroups, mailing lists and forums.
All logos and trademarks in this site are property of their respective owner. The comments are property of their posters. Articles are the property of their respective owners. Unless otherwise stated in the body of the article, article content (C) 1994-2013 by James Mohr. All rights reserved. The stylized page/paper, as well as the terms "The Linux Tutorial", "The Linux Server Tutorial", "The Linux Knowledge Base and Tutorial" and "The place where you learn Linux" are service marks of James Mohr. All rights reserved.
The Linux Knowledge Base and Tutorial may contain links to sites on the Internet, which are owned and operated by third parties. The Linux Tutorial is not responsible for the content of any such third-party site. By viewing/utilizing this web site, you have agreed to our disclaimer, terms of use and privacy policy. Use of automated download software ("harvesters") such as wget, httrack, etc. causes the site to quickly exceed its bandwidth limitation and are therefore expressly prohibited. For more details on this, take a look here

PHP-Nuke Copyright © 2004 by Francisco Burzi. This is free software, and you may redistribute it under the GPL. PHP-Nuke comes with absolutely no warranty, for details, see the license.
Page Generation: 0.08 Seconds