Solved

rhosts - how to enable wildcard remsh access

Posted on 1997-07-09
4
1,348 Views
Last Modified: 2012-05-04
I'm trying to enable remsh to accept any user from any remote system. I created a .rhosts file with the following line:
+ +
but that didn't seem to work. I'm using Red Hat linux 4.2.. any ideas?
0
Comment
Question by:tverona
  • 2
  • 2
4 Comments
 
LVL 51

Accepted Solution

by:
ahoffmann earned 100 total points
ID: 1585372
you must add your hosts to
      /etc/hosts.equiv
or setup
      /etc/hosts.allow  /etc/hosts/deny
see   man 5 hosts_access

Ciao Achim
0
 

Author Comment

by:tverona
ID: 1585373
I listed the hosts to hosts.equiv, but still no luck.
I've also tried setting up /etc/hosts.allow with ALL: ALL
which indicates that all access should be allowed, but it still
doesn't work (btw, by default access is allwed)
Ideally, the Linux machine shouldn't maintain a list of hosts and users. It's etc/passwd file contains, say, the user 'build', and
we want to be able to execute the command
remsh linux_machine -l build "cc blah.c"
from a user on a remote machine.
0
 
LVL 51

Expert Comment

by:ahoffmann
ID: 1585374
Hmm, hosts.equiv should work. The hostname must be a full qualified domain name.
Do you also have $HOME/.rhosts for your users?
0
 

Author Comment

by:tverona
ID: 1585375
Actually, I ended up tweaking the ruserok() function to make it
more like other UNIX implementations. On most unix systems, you
can simply have a line like "+ +" in hosts.equiv, which gives
global access to remote hosts and users (the '+' being the
wildcard). I added this to ruserok() in rcmd.c - the function
that checks hosts.equiv, recompiled libc, and it seems to work
fine! Thanks anyways though!
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
Note: for this to work properly you need to use a Cross-Over network cable. 1. Connect both servers S1 and S2 on the second network slots respectively. Note that you can use the 1st slots but usually these would be occupied by the Service Provide…
Video by: Mark
This lesson goes over how to construct ordered and unordered lists and how to create hyperlinks.
Hi friends,  in this video  I'll show you how new windows 10 user can learn the using of windows 10. Thank you.

911 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

24 Experts available now in Live!

Get 1:1 Help Now