Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions

How to secure remote access (.rhosts) on AIX

Posted on 2011-09-14
Last Modified: 2012-05-12

I am new to AIX. I wonder how to make remote access (.rhosts) secure. Please help
Question by:cismoney
  • 3
  • 2
LVL 68

Assisted Solution

woolmilkporc earned 250 total points
ID: 36534719
The only way to make it secure is disabling it. Use ssh instead.

To disable .rhosts access go to "smitty inetdconf", choose "Remove an inetd Subserver",
select "shell" and hit Enter.
Repeat this for "exec".

LVL 21

Accepted Solution

Papertrip earned 250 total points
ID: 36534836
chsubserver -r inetd -C /etc/inetd.conf -d -v login -p tcp
refresh -s inetd

Open in new window

LVL 68

Expert Comment

ID: 36534875
OK, I forgot:

Repeat the "smitty inetdconf" steps I gave you above for "login" as well.
LVL 21

Expert Comment

ID: 36534878
Hi wmp :)
LVL 68

Expert Comment

ID: 36534905
Hi Papertrip! LTNS!

Featured Post

Free Tool: Site Down Detector

Helpful to verify reports of your own downtime, or to double check a downed website you are trying to access.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When you do backups in the Solaris Operating System, the file system must be inactive. Otherwise, the output may be inconsistent. A file system is inactive when it's unmounted or it's write-locked by the operating system. Although the fssnap utility…
In tuning file systems on the Solaris Operating System, changing some parameters of a file system usually destroys the data on it. For instance, changing the cache segment block size in the volume of a T3 requires that you delete the existing volu…
Learn several ways to interact with files and get file information from the bash shell. ls lists the contents of a directory: Using the -a flag displays hidden files: Using the -l flag formats the output in a long list: The file command gives us mor…
This video shows how to set up a shell script to accept a positional parameter when called, pass that to a SQL script, accept the output from the statement back and then manipulate it in the Shell.

809 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question