/dports/net-mgmt/rcpd/rcpd-1.3/ |
H A D | CHANGES | 26 * rshd.c: Fixup setuid() return value checking. 52 * rshd.c: Fix a few typoes. 86 * rshd.c: We should log errors with severity LOG_ERR. 117 * rshd.c: Add TOS INTERNETWORK-CONTROL support. 141 * rshd.c: Fix includes. 154 * rshd.c: -Wall police 156 * rshd.c (rpcargc): typo 158 * rshd.c: Security audit done. 169 * rshd.c: Fix copyrights, actually call rcp(). 173 * rshd.c: Rsh stub is basically done. [all …]
|
H A D | README | 5 When we say standalone, we mean it does not require an rshd to be 9 This rshd is intended as a drop-in replacement for tftpd, to be 48 If for some reason you have to have *BOTH* rcpd and rshd coexisting, you can 52 shell stream tcp nowait root /usr/local/libexec/tcpd in.rshd 56 in.rshd : evil_stupid_host_that_is_insecure_and_needs_rsh 60 in.rshd : ALL except evil_stupid... : twist PATH=/usr/local/libexec; exec rcpd 66 It is heavily based on code from the 44bsd Lite distribution of rshd and
|
H A D | Makefile.am | 10 rcpd_SOURCES = rcp.c rshd.c strerror.c util.c
|
H A D | Makefile.in | 127 rcpd_SOURCES = rcp.c rshd.c strerror.c util.c 157 am_rcpd_OBJECTS = rcp.$(OBJEXT) rshd.$(OBJEXT) strerror.$(OBJEXT) \ 167 @AMDEP_TRUE@DEP_FILES = ./$(DEPDIR)/rcp.Po ./$(DEPDIR)/rshd.Po \ 260 @AMDEP_TRUE@@am__include@ @am__quote@./$(DEPDIR)/rshd.Po@am__quote@
|
/dports/security/ossec-hids-server/ossec-hids-3.6.0/contrib/ossec-testing/tests/ |
H A D | rsh.ini | 1 [rshd: illegal] 2 log 1 pass = Dec 17 10:49:23 hostname rshd[347339]: Connection from 10.217.223.31 on illegal port 7 decoder = rshd
|
H A D | cimserver.ini | 1 [rshd: illegal]
|
/dports/security/ossec-hids-local/ossec-hids-3.6.0/contrib/ossec-testing/tests/ |
H A D | rsh.ini | 1 [rshd: illegal] 2 log 1 pass = Dec 17 10:49:23 hostname rshd[347339]: Connection from 10.217.223.31 on illegal port 7 decoder = rshd
|
H A D | cimserver.ini | 1 [rshd: illegal]
|
/dports/security/ossec-hids-agent/ossec-hids-3.6.0/contrib/ossec-testing/tests/ |
H A D | rsh.ini | 1 [rshd: illegal] 2 log 1 pass = Dec 17 10:49:23 hostname rshd[347339]: Connection from 10.217.223.31 on illegal port 7 decoder = rshd
|
H A D | cimserver.ini | 1 [rshd: illegal]
|
/dports/net/bsdrcmds/bsdrcmds-20171003.01/rshd/ |
H A D | Makefile | 6 PROG= rshd 7 MAN= rshd.8
|
/dports/devel/cvs-devel/cvs-1.12.13/ |
H A D | README.VMS | 61 via rshd. Unfortunately, this requires the VMS CVS client to be 69 If rshd receives a connection on a non-privileged port, the connection is 83 than the disease. If you patch an rshd to not care that the RSH originating 85 logical CVS_RCMD_PORT to the port number where this patched rshd will be 86 listening. I leave the talk of patching rshd to the gentle reader and his/her 103 Note that the patched rshd will need to be invoked via inetd as root, so it can 104 authenticate and _become_ the intended user, the same as the regular rshd.
|
/dports/security/logcheck/logcheck/rulefiles/linux/cracking.d/ |
H A D | rsh | 1 rshd\[[0-9]+\]: Connection from [.0-9]+ on illegal port
|
/dports/net/bsdrcmds/bsdrcmds-20171003.01/ |
H A D | Makefile | 5 rshd
|
/dports/www/p5-Gantry/Gantry-3.64/root/ |
H A D | delete.tt | 10 <td class="rshd">
|
H A D | search.tt | 97 <td colspan="2" class="rshd">
|
/dports/devel/dev86/dev86-0.16.20/libbsd/ |
H A D | README | 94 rshd: Works. 122 shell stream tcp nowait root /usr/etc/inet/rshd rshd
|
/dports/net-mgmt/ipcad/ipcad-3.7.3/ |
H A D | README | 33 with the standard rsh protocol (rshd(8)), with exception that it NEVER
|
/dports/net/openmpi3/openmpi-3.1.6/contrib/platform/ornl/ |
H A D | ornl_configure_self_contained | 107 …-libnuma,ess-cnos,ess-slurm,ess-slurmd,filem-rsh,grpcomm-cnos,plm-rsh,plm-rshd,plm-slurm,pml-dr,bt…
|
/dports/net/openmpi/openmpi-4.1.1/contrib/platform/ornl/ |
H A D | ornl_configure_self_contained | 107 …-libnuma,ess-cnos,ess-slurm,ess-slurmd,filem-rsh,grpcomm-cnos,plm-rsh,plm-rshd,plm-slurm,pml-dr,bt…
|
/dports/www/libwww/w3c-libwww-5.4.2/Library/src/ |
H A D | HTReq.h | 584 extern void HTRequest_setRsHd (HTRequest * request, HTRsHd rshd); 585 extern void HTRequest_addRsHd (HTRequest * request, HTRsHd rshd);
|
H A D | HTReqMan.c | 596 PUBLIC void HTRequest_setRsHd (HTRequest * me, HTRsHd rshd) in HTRequest_setRsHd() argument 598 if (me) me->ResponseMask = rshd; in HTRequest_setRsHd() 601 PUBLIC void HTRequest_addRsHd (HTRequest * me, HTRsHd rshd) in HTRequest_addRsHd() argument 603 if (me) me->ResponseMask |= rshd; in HTRequest_addRsHd()
|
/dports/science/bagel/bagel-1.2.2/src/integral/ecp/testcode/ang_proj/ |
H A D | main.cc | 305 std::shared_ptr<RealSH> rshd = std::make_shared<RealSH>(lmd, centreB); in main() local 306 std::shared_ptr<ProjectionInt> projABd = std::make_shared<ProjectionInt>(gA, rshd); in main() 307 std::shared_ptr<ProjectionInt> projCBd = std::make_shared<ProjectionInt>(gC, rshd); in main()
|
/dports/security/xinetd/xinetd-2.3.15/xinetd/ |
H A D | sample.conf | 42 server = /usr/etc/in.rshd
|
/dports/sysutils/pdsh/pdsh-pdsh-2.34/ |
H A D | README.modules | 28 Requires: rshd server running on remote nodes
|