Solved

RSH login to Unix when user name has spaces

Posted on 1998-07-22
4
294 Views
Last Modified: 2013-12-23
I am trying to use 'rsh <hostname> -l <usename> -n ls '. This works from NT to Unix when the NT user name has no spaces. However I have users who are set up in the form 'Fred Bloggs'. I have tried all sorts of patterns in the .rhosts file on the Unix system all to no avail. Any ideas ?
0
Comment
Question by:stewa
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
4 Comments
 
LVL 51

Expert Comment

by:ahoffmann
ID: 1568729
add the NT system to /etc/hosts.equiv
0
 

Author Comment

by:stewa
ID: 1568730
I already have the host in /etc/hosts.equiv. and in username's .rhosts
0
 
LVL 51

Expert Comment

by:ahoffmann
ID: 1568731
If you still have the host in hosts.equiv, have you tried to remove user's .rhosts file.
If this fails too (some undocumented restrictions in UNIX's userbames), you need a patched ruserok() in libc.{a,so} .
0
 
LVL 10

Accepted Solution

by:
rbr earned 40 total points
ID: 1568732
Did you try rsh <hostname> -l "<usename>" -n ls

0

Featured Post

Free learning courses: Active Directory Deep Dive

Get a firm grasp on your IT environment when you learn Active Directory best practices with Veeam! Watch all, or choose any amount, of this three-part webinar series to improve your skills. From the basics to virtualization and backup, we got you covered.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Internet Speed Test 5 147
Surface Pro 4 wifi 4 50
exclude a user from a deny permisssion 4 83
can i use this ip range for my company 3 50
FIPS stands for the Federal Information Processing Standardisation and FIPS 140-2 is a collection of standards that are generically associated with hardware and software cryptography. In most cases, people can refer to this as the method of encrypti…
This is the first one of a series of articles I’ll be writing to address technical issues that are always referred to as network problems. The network boundaries have changed, therefore having an understanding of how each piece in the network  puzzl…
Nobody understands Phishing better than an anti-spam company. That’s why we are providing Phishing Awareness Training to our customers. According to a report by Verizon, only 3% of targeted users report malicious emails to management. With compan…

734 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question