Solved

rsh just quit working w/o p/w

Posted on 2004-04-28
6
394 Views
Last Modified: 2010-04-21
Can a power outage of your facility - in spite of a lot of UPS(s) - can this affect an AIX box running rsh? Ours was working perfectly but since the outage, rsh wants a password for all users. Nothing was changed in the directories nor can we see anything we need to re-set. Many thanks.
0
Comment
Question by:macs6rule
6 Comments
 
LVL 7

Expert Comment

by:fim32
ID: 10941677
perhaps some files were corrupted during the power loss, or something else is down?

i would check the basics for rsh, like the /etc/hosts.equiv file or the .rhosts file for the user you're trying to execute commands as.  perhaps name resolution is no longer returning a name that matches in this file?
0
 
LVL 48

Expert Comment

by:Tintin
ID: 10944124
How was rsh setup?  /etc/hosts.equiv or .rhosts files?

Why are you using rsh instead of ssh?
0
 
LVL 61

Expert Comment

by:gheist
ID: 10944543
maybe server host cannot resolve host where users live (broken dns or /etc/hosts)
0
Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

 
LVL 51

Accepted Solution

by:
ahoffmann earned 250 total points
ID: 10966613
please check /var/log/{messages,syslog} on the server, and post relevant messages if any
0
 
LVL 7

Expert Comment

by:glassd
ID: 10976320
What files are you using to avoid password requirements. Check their contents AND permissions. AIX likes them to be read-only and users .rhosts should be readable only by them.

If the files contain a short host name, try including a line with the fully qualified name. I've known this to be a problem.
0
 
LVL 48

Expert Comment

by:Tintin
ID: 10991957
And the answer in the log file was????
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Introduction Regular patching is part of a system administrator's tasks. However, many patches require that the system be in single-user mode before they can be installed. A cluster patch in particular can take quite a while to apply if the machine…
Java performance on Solaris - Managing CPUs There are various resource controls in operating system which directly/indirectly influence the performance of application. one of the most important resource controls is "CPU".   In a multithreaded…
Learn how to find files with the shell using the find and locate commands. Use locate to find a needle in a haystack.: With locate, check if the file still exists.: Use find to get the actual location of the file.:
In a previous video, we went over how to export a DynamoDB table into Amazon S3.  In this video, we show how to load the export from S3 into a DynamoDB table.

895 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now