Solved

remsh permission denied

Posted on 1997-03-18
1
1,289 Views
Last Modified: 2013-12-16
I have recently installed SCO Open Server on a couple of machines which communicate via  ethernet to a couple of NCR 3500 machines.
Occasionally I need to edit a file on the SCO machines remotely from the 3500's from a script run as root.
According to SCO documentation I need an entry in /etc/passwd plus an entry in .rhosts in the root directory, in the format hostname root, for remshd to validate the logon. I have done both of these but still get the message:-
permission denied
remsh:can't establish remote.

I have also put an entry in /etc/hosts.equiv
the hostname is present in /etc/hosts.

I'm sure that I'm overlooking something simple like permissions somewhere.

Thanks in advance
0
Comment
Question by:philt022797
1 Comment
 
LVL 2

Accepted Solution

by:
pxh earned 50 total points
ID: 1811945
Make shure that .rhosts is alright. First it has to be on the root directory, i.e. /.rhosts  second the host specified in .rhosts has to be either the full internet address (with the domain appended) or only the hostname. This is easy to find out. If you are on the remote system do a rlogin (or telnet) to the target machine. Then enter "who" and you should see your login with the originating host in brackets at the end of the line. You can recognize whether your local host is "seen" with or without the domainname appended. Be careful the who output line might be truncated.

Another detail: how are you logged in on the local machine?
E.g. you are sitting in front of host_l as user philt and you want to remote edit on host_r as root. What you really need is /.rhosts on host_r with the entry "host_l philt". host_l has to
be a hostname or Internet address according to the above rules.

You can check this by issuing "rlogin host_r -l root" from host_l. If you are asked for a password something is still wrong with the .rhosts file.

Hope this helps,

Peter

0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

My previous tech tip, Installing the Solaris OS From the Flash Archive On a Tape (http://www.experts-exchange.com/articles/OS/Unix/Solaris/Installing-the-Solaris-OS-From-the-Flash-Archive-on-a-Tape.html), discussed installing the Solaris Operating S…
Introduction Regular patching is part of a system administrator's tasks. However, many patches require that the system be in single-user mode before they can be installed. A cluster patch in particular can take quite a while to apply if the machine…
Learn how to get help with Linux/Unix bash shell commands. Use help to read help documents for built in bash shell commands.: Use man to interface with the online reference manuals for shell commands.: Use man to search man pages for unknown command…
In a previous video, we went over how to export a DynamoDB table into Amazon S3.  In this video, we show how to load the export from S3 into a DynamoDB table.

943 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now