[BACK]Return to rsh.1 CVS log [TXT][DIR] Up to [local] / src / usr.bin / rsh

Diff for /src/usr.bin/rsh/Attic/rsh.1 between version 1.10 and 1.11

version 1.10, 2001/06/23 23:15:37 version 1.11, 2002/05/06 22:50:03
Line 53 
Line 53 
 on  on
 .Ar hostname .  .Ar hostname .
 .Pp  .Pp
   .Em Note:
 .Nm  .Nm
   has been deprecated in favor of
   .Xr ssh 1 .
   Use of
   .Nm
   is discouraged due to the inherent insecurity of host-based authentication.
   .Pp
   .Nm
 copies its standard input to the remote command, the standard  copies its standard input to the remote command, the standard
 output of the remote command to its standard output, and the  output of the remote command to its standard output, and the
 standard error of the remote command to its standard error.  standard error of the remote command to its standard error.
Line 62 
Line 70 
 .Nm  .Nm
 normally terminates when the remote command does.  normally terminates when the remote command does.
 .Pp  .Pp
   .Nm
   first attempts to use the Kerberos authorization mechanism, described below.
   If the remote host does not support Kerberos the standard Berkeley
   .Pa rhosts
   authorization mechanism is used.
   .Pp
 The options are as follows:  The options are as follows:
 .Bl -tag -width Ds  .Bl -tag -width Ds
 .It Fl K  .It Fl K
Line 84 
Line 98 
 The  The
 .Fl l  .Fl l
 option allows the remote name to be specified.  option allows the remote name to be specified.
 Kerberos authentication is used, and authorization is determined  
 as in  
 .Xr rlogin 1 .  
 .It Fl n  .It Fl n
 Redirect input from the special device  Redirect input from the special device
 .Pa /dev/null  .Pa /dev/null
Line 98 
Line 109 
 If no  If no
 .Ar command  .Ar command
 is specified, you will be logged in on the remote host using  is specified, you will be logged in on the remote host using
 .Xr rlogin 1 .  .Nm rlogin
   if it exists on the system or
   .Xr telnet 1
   if not.
 .Pp  .Pp
 If  If
 .Nm  .Nm
Line 131 
Line 145 
 .\" directory /usr/hosts.  .\" directory /usr/hosts.
 .\" If this directory is included in your search path, you can use the  .\" If this directory is included in your search path, you can use the
 .\" shorthand ``host command'' for the longer form ``rsh host command''.  .\" shorthand ``host command'' for the longer form ``rsh host command''.
   .Sh KERBEROS AUTHENTICATION
   If Kerberos is configured on the system, each user may have a private
   authorization list in the file
   .Pa .klogin
   in their home directory.
   Each line in this file should contain a Kerberos principal name of the form
   .Ar principal.instance@realm .
   If the originating user is authenticated to one of the principals named in
   .Pa .klogin ,
   access is granted to the account.
   The principal
   .Ar accountname.@localrealm
   is granted access if there is no
   .Pa .klogin
   file.
   Otherwise a login and password will be prompted for on the remote machine
   as in
   .Xr login 1 .
   To avoid certain security problems, the
   .Pa .klogin
   file must be owned by the remote user.
 .Sh FILES  .Sh FILES
 .Bl -tag -width /etc/hosts -compact  .Bl -tag -width /etc/hosts -compact
 .It Pa /etc/hosts  .It Pa /etc/hosts
 .El  .El
 .Sh SEE ALSO  .Sh SEE ALSO
 .Xr rlogin 1 ,  .Xr telnet 1 ,
 .Xr kerberos 3 ,  .Xr kerberos 3 ,
 .Xr krb_realmofhost 3 ,  .Xr krb_realmofhost 3 ,
 .Xr krb_sendauth 3 ,  .Xr krb_sendauth 3 ,
Line 169 
Line 204 
 using  using
 .Nm rsh ;  .Nm rsh ;
 use  use
 .Xr rlogin 1  .Xr telnet 1
 instead.  instead.
 .Pp  .Pp
 Stop signals stop the local  Stop signals stop the local

Legend:
Removed from v.1.10  
changed lines
  Added in v.1.11