disallow non-root from starting daemon or queue mode;
[unix-history] / usr / src / libexec / rlogind / rlogind.8
CommitLineData
eb97b157
KB
1.\" Copyright (c) 1983 The Regents of the University of California.
2.\" All rights reserved.
9ada66f8 3.\"
eb97b157
KB
4.\" Redistribution and use in source and binary forms are permitted
5.\" provided that the above copyright notice and this paragraph are
6.\" duplicated in all such forms and that any documentation,
7.\" advertising materials, and other materials related to such
8.\" distribution and use acknowledge that the software was developed
9.\" by the University of California, Berkeley. The name of the
10.\" University may not be used to endorse or promote products derived
11.\" from this software without specific prior written permission.
12.\" THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR
13.\" IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
14.\" WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
9ada66f8 15.\"
eb97b157
KB
16.\" @(#)rlogind.8 6.4 (Berkeley) %G%
17.\"
18.TH RLOGIND 8 ""
9ada66f8
KM
19.UC 5
20.SH NAME
21rlogind \- remote login server
22.SH SYNOPSIS
23.B /etc/rlogind
24[
25.B \-d
26]
27.SH DESCRIPTION
28.I Rlogind
29is the server for the
30.IR rlogin (1C)
31program. The server provides a remote login facility
be1d37d3 32with authentication based on privileged port numbers from trusted hosts.
9ada66f8
KM
33.PP
34.I Rlogind
35listens for service requests at the port indicated in
36the ``login'' service specification; see
37.IR services (5).
38When a service request is received the following protocol
39is initiated:
40.IP 1)
41The server checks the client's source port.
42If the port is not in the range 0-1023, the server
43aborts the connection.
44.IP 2)
14dbbfdc
MK
45The server checks the client's source address
46and requests the corresponding host name (see
be1d37d3
MK
47.IR gethostbyaddr (3N),
48.IR hosts (5)
49and
14dbbfdc
MK
50.IR named (8)).
51If the hostname cannot be determined,
be1d37d3 52the dot-notation representation of the host address is used.
9ada66f8
KM
53.PP
54Once the source port and address have been checked,
55.I rlogind
56allocates a pseudo terminal (see
57.IR pty (4)),
58and manipulates file descriptors so that the slave
59half of the pseudo terminal becomes the
60.B stdin ,
61.B stdout ,
62and
63.B stderr
64for a login process.
65The login process is an instance of the
66.IR login (1)
67program, invoked with the
68.B \-r
69option. The login process then proceeds with the authentication
70process as described in
71.IR rshd (8C),
72but if automatic authentication fails, it reprompts the user
73to login as one finds on a standard terminal line.
74.PP
75The parent of the login process manipulates the master side of
76the pseduo terminal, operating as an intermediary
77between the login process and the client instance of the
78.I rlogin
79program. In normal operation, the packet protocol described
80in
81.IR pty (4)
82is invoked to provide ^S/^Q type facilities and propagate
83interrupt signals to the remote programs. The login process
84propagates the client terminal's baud rate and terminal type,
85as found in the environment variable, ``TERM''; see
86.IR environ (7).
be1d37d3
MK
87The screen or window size of the terminal is requested from the client,
88and window size changes from the client are propagated to the pseudo terminal.
9ada66f8
KM
89.SH DIAGNOSTICS
90All diagnostic messages are returned on the connection
91associated with the
92.BR stderr ,
93after which any network connections are closed.
94An error is indicated by a leading byte with a value of 1.
95.PP
9ada66f8
KM
96.B ``Try again.''
97.br
98A
99.I fork
100by the server failed.
101.PP
102.B ``/bin/sh: ...''
103.br
104The user's login shell could not be started.
105.SH BUGS
106The authentication procedure used here assumes the integrity
107of each client machine and the connecting medium. This is
108insecure, but is useful in an ``open'' environment.
109.PP
110A facility to allow all data exchanges to be encrypted should be
111present.
14dbbfdc
MK
112.PP
113A more extensible protocol should be used.