SCCS-vsn: libexec/rlogind/rlogind.8 6.5
.\" IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
.\" WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
.\"
.\" IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
.\" WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
.\"
-.\" @(#)rlogind.8 6.4 (Berkeley) %G%
+.\" @(#)rlogind.8 6.5 (Berkeley) %G%
.\"
.TH RLOGIND 8 ""
.UC 5
.\"
.TH RLOGIND 8 ""
.UC 5
.SH SYNOPSIS
.B /etc/rlogind
[
.SH SYNOPSIS
.B /etc/rlogind
[
]
.SH DESCRIPTION
.I Rlogind
is the server for the
]
.SH DESCRIPTION
.I Rlogind
is the server for the
program. The server provides a remote login facility
with authentication based on privileged port numbers from trusted hosts.
.PP
program. The server provides a remote login facility
with authentication based on privileged port numbers from trusted hosts.
.PP
.IP 2)
The server checks the client's source address
and requests the corresponding host name (see
.IP 2)
The server checks the client's source address
and requests the corresponding host name (see
.IR hosts (5)
and
.IR named (8)).
.IR hosts (5)
and
.IR named (8)).
.B \-r
option. The login process then proceeds with the authentication
process as described in
.B \-r
option. The login process then proceeds with the authentication
process as described in
but if automatic authentication fails, it reprompts the user
but if automatic authentication fails, it reprompts the user
-to login as one finds on a standard terminal line.
+to login as one finds on a standard terminal line. The
+.I -p
+option prevents any authentication based on the user's
+``.rhosts'' file.
.PP
The parent of the login process manipulates the master side of
the pseduo terminal, operating as an intermediary
.PP
The parent of the login process manipulates the master side of
the pseduo terminal, operating as an intermediary
.B ``/bin/sh: ...''
.br
The user's login shell could not be started.
.B ``/bin/sh: ...''
.br
The user's login shell could not be started.
+.SH "SEE ALSO"
+ruserok(3), rshd(8)
.SH BUGS
The authentication procedure used here assumes the integrity
of each client machine and the connecting medium. This is
.SH BUGS
The authentication procedure used here assumes the integrity
of each client machine and the connecting medium. This is