Solved

rsh setup

Posted on 2000-04-22
5
1,626 Views
Last Modified: 2013-12-23
How can I setup rsh on a linux server?
(I am root and the linux is Red Hat ver 6.1)
0
Comment
Question by:karouri
  • 2
  • 2
5 Comments
 
LVL 3

Author Comment

by:karouri
ID: 2739780
Actually I can rlogin on the server,using a non-root login. However, I cannot rsh a command there.Does it need a setup and if so how?
0
 
LVL 84

Expert Comment

by:ozo
ID: 2740067
if rshd is running, you can allow users in with /etc/hosts.equiv and .rhosts
0
 
LVL 40

Accepted Solution

by:
jlevie earned 50 total points
ID: 2740083
To expand a bit on ozo's comment (he slipped his in while I was composing mine...

The remote system needs a .rhosts file in your home directoryon the remote that contains the hostname your local system and your local username, like:

my-local.system.com my-local-user-name

The ~/.rhosts file on the remote must be owned by root or by your user name on the remote system and must be writable only by the owner (and ought to be mode 600).  You also must list the local system in the remote's /etc/hosts.equiv file.

Don't ever, absolutely never, don't even consider, allowing root rsh access, unless these two computers are on the only systems on an isolated network with no external connection to anywhere. A root account with rsh access is a gaping security hole. Use an ordinary user account (and you shouldn't be routinely logging in as root anyway, it's too dangerous) at both ends.
0
 
LVL 3

Author Comment

by:karouri
ID: 2741656
Thanks jlevie, it worked.
As for the matter of security, I am on the process of installing a software that needs to execute some processes on the same machine using rsh (actually written for multiple machines),and my machine isn't on a network. Besides, I need only to test it using root,after installation I don't intend to use the root account.

Thanks ozo, too.
0
 
LVL 40

Expert Comment

by:jlevie
ID: 2741751
That's cool. There are ways of securely doing fixed tasks on a remote via rsh that require root privs without actually allowing root rsh access. The best, in my opinon, are small executables, suid to root, that know how to accomplish that task (and only that task). Some folks use suid scripts, but I'm not real comfortable with the exposure to prying eyes that scripts imply.
0

Featured Post

Microsoft Certification Exam 74-409

Veeam® is happy to provide the Microsoft community with a study guide prepared by MVP and MCT, Orin Thomas. This guide will take you through each of the exam objectives, helping you to prepare for and pass the examination.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
Secure Connection Failed - Sonicwall FW 1 85
Hyper-V VM not connected 1 124
By pass website on ASA for Websense 4 74
NAS with google authentication 6 101
If you're not part of the solution, you're part of the problem.   Tips on how to secure IoT devices, even the dumbest ones, so they can't be used as part of a DDoS botnet.  Use PRTG Network Monitor as one of the building blocks, to detect unusual…
Most of the applications these days are on Cloud. Cloud is ubiquitous with many service providers in the market. Since it has many benefits such as cost reduction, software updates, remote access, disaster recovery and much more.
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

803 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question