Solved

rhosts - how to enable wildcard remsh access

Posted on 1997-07-09
4
1,349 Views
Last Modified: 2012-05-04
I'm trying to enable remsh to accept any user from any remote system. I created a .rhosts file with the following line:
+ +
but that didn't seem to work. I'm using Red Hat linux 4.2.. any ideas?
0
Comment
Question by:tverona
  • 2
  • 2
4 Comments
 
LVL 51

Accepted Solution

by:
ahoffmann earned 100 total points
ID: 1585372
you must add your hosts to
      /etc/hosts.equiv
or setup
      /etc/hosts.allow  /etc/hosts/deny
see   man 5 hosts_access

Ciao Achim
0
 

Author Comment

by:tverona
ID: 1585373
I listed the hosts to hosts.equiv, but still no luck.
I've also tried setting up /etc/hosts.allow with ALL: ALL
which indicates that all access should be allowed, but it still
doesn't work (btw, by default access is allwed)
Ideally, the Linux machine shouldn't maintain a list of hosts and users. It's etc/passwd file contains, say, the user 'build', and
we want to be able to execute the command
remsh linux_machine -l build "cc blah.c"
from a user on a remote machine.
0
 
LVL 51

Expert Comment

by:ahoffmann
ID: 1585374
Hmm, hosts.equiv should work. The hostname must be a full qualified domain name.
Do you also have $HOME/.rhosts for your users?
0
 

Author Comment

by:tverona
ID: 1585375
Actually, I ended up tweaking the ruserok() function to make it
more like other UNIX implementations. On most unix systems, you
can simply have a line like "+ +" in hosts.equiv, which gives
global access to remote hosts and users (the '+' being the
wildcard). I added this to ruserok() in rcmd.c - the function
that checks hosts.equiv, recompiled libc, and it seems to work
fine! Thanks anyways though!
0

Featured Post

What is SQL Server and how does it work?

The purpose of this paper is to provide you background on SQL Server. It’s your self-study guide for learning fundamentals. It includes both the history of SQL and its technical basics. Concepts and definitions will form the solid foundation of your future DBA expertise.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
Note: for this to work properly you need to use a Cross-Over network cable. 1. Connect both servers S1 and S2 on the second network slots respectively. Note that you can use the 1st slots but usually these would be occupied by the Service Provide…
Two types of users will appreciate AOMEI Backupper Pro: 1 - Those with PCIe drives (and haven't found cloning software that works on them). 2 - Those who want a fast clone of their boot drive (no re-boots needed) and it can clone your drive wh…
The Email Laundry PDF encryption service allows companies to send confidential encrypted  emails to anybody. The PDF document can also contain attachments that are embedded in the encrypted PDF. The password is randomly generated by The Email Laundr…

786 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question