starts a terminal session on a remote host
first attempts to use the Kerberos authorization mechanism, described below.
If the remote host does not supporting Kerberos the standard Berkeley
authorization mechanism is used.
The options are as follows:
The
option allows an eight-bit input data path at all times; otherwise
parity bits are stripped except when the remote side's stop and start
characters are other than
^S/^Q .
The
option stops any character from being recognized as an escape character.
When used with the
option, this provides a completely transparent connection.
The
option turns off all Kerberos authentication.
The
option allows the rlogin session to be run in ``litout'' (see
mode.
The
option turns on socket debugging (see
on the TCP sockets used for communication with the remote host.
The
option allows user specification of the escape character, which is
``~'' by default.
This specification may be as a literal character, or as an octal
value in the form \nnn.
The
option requests rlogin to obtain tickets for the remote host
in realm
instead of the remote host's realm as determined by
The
option turns on
encryption for all data passed via the
rlogin session.
This may impact response time and
utilization, but provides
increased security.
A line of the form ``<escape char>.'' disconnects from the remote host.
Similarly, the line ``<escape char>^Z'' will suspend the
session, and ``<escape char><delayed-suspend char>'' suspends the
send portion of the rlogin, but allows output from the remote system.
By default, the tilde (``~'') character is the escape character, and
normally control-Y (``^Y'') is the delayed-suspend character.
All echoing takes place at the remote site, so that (except for delays)
the
is transparent.
Flow control via ^S/^Q and flushing of input and output on interrupts
are handled properly.
Each user may have a private authorization list in the file
in their home directory.
Each line in this file should contain a Kerberos principal name of the
form
If the originating user is authenticated to one of the principals named
in
access is granted to the account.
The principal
is granted access if
there is no
file.
Otherwise a login and password will be prompted for on the remote machine
as in
To avoid certain security problems, the
file must be owned by
the remote user.
If Kerberos authentication fails, a warning message is printed and the
standard Berkeley
is used instead.
The following environment variable is utilized by
Determines the user's terminal type.
The
command appeared in
will be replaced by
in the near future.
More of the environment should be propagated.
webmaster | delorie software privacy |
Copyright © 2003 by The Free Software Foundation | Updated Jun 2003 |