1.\" Copyright (c) 1983, 1990, 1993 2.\" The Regents of the University of California. All rights reserved. 3.\" 4.\" %sccs.include.redist.roff% 5.\" 6.\" @(#)rlogin.1 8.2 (Berkeley) 04/29/95 7.\" 8.Dd 9.Dt RLOGIN 1 10.Os BSD 4.2 11.Sh NAME 12.Nm rlogin 13.Nd remote login 14.Sh SYNOPSIS 15.Nm rlogin 16.Op Fl 8EKLdx 17.Op Fl e Ar char 18.Op Fl k Ar realm 19.Op Fl l Ar username 20.Ar host 21.Nm rlogin 22.Op Fl 8EKLdx 23.Op Fl e Ar char 24.Op Fl k Ar realm 25.Ar username@host 26.Sh DESCRIPTION 27.Nm Rlogin 28starts a terminal session on a remote host 29.Ar host . 30.Pp 31.Nm Rlogin 32first attempts to use the Kerberos authorization mechanism, described below. 33If the remote host does not supporting Kerberos the standard Berkeley 34.Pa rhosts 35authorization mechanism is used. 36The options are as follows: 37.Bl -tag -width flag 38.It Fl 8 39The 40.Fl 8 41option allows an eight-bit input data path at all times; otherwise 42parity bits are stripped except when the remote side's stop and start 43characters are other than 44^S/^Q . 45.It Fl E 46The 47.Fl E 48option stops any character from being recognized as an escape character. 49When used with the 50.Fl 8 51option, this provides a completely transparent connection. 52.It Fl K 53The 54.Fl K 55option turns off all Kerberos authentication. 56.It Fl L 57The 58.Fl L 59option allows the rlogin session to be run in ``litout'' (see 60.Xr tty 4 ) 61mode. 62.It Fl d 63The 64.Fl d 65option turns on socket debugging (see 66.Xr setsockopt 2 ) 67on the TCP sockets used for communication with the remote host. 68.It Fl e 69The 70.Fl e 71option allows user specification of the escape character, which is 72``~'' by default. 73This specification may be as a literal character, or as an octal 74value in the form \ennn. 75.It Fl k 76The 77.FL k 78option requests rlogin to obtain tickets for the remote host 79in realm 80.Ar realm 81instead of the remote host's realm as determined by 82.Xr krb_realmofhost 3 . 83.It Fl x 84The 85.Fl x 86option turns on 87.Tn DES 88encryption for all data passed via the 89rlogin session. 90This may impact response time and 91.Tn CPU 92utilization, but provides 93increased security. 94.El 95.Pp 96A line of the form ``<escape char>.'' disconnects from the remote host. 97Similarly, the line ``<escape char>^Z'' will suspend the 98.Nm rlogin 99session, and ``<escape char><delayed-suspend char>'' suspends the 100send portion of the rlogin, but allows output from the remote system. 101By default, the tilde (``~'') character is the escape character, and 102normally control-Y (``^Y'') is the delayed-suspend character. 103.Pp 104All echoing takes place at the remote site, so that (except for delays) 105the 106.Nm rlogin 107is transparent. 108Flow control via ^S/^Q and flushing of input and output on interrupts 109are handled properly. 110.Sh KERBEROS AUTHENTICATION 111Each user may have a private authorization list in the file 112.Pa .klogin 113in their home directory. 114Each line in this file should contain a Kerberos principal name of the 115form 116.Ar principal.instance@realm . 117If the originating user is authenticated to one of the principals named 118in 119.Pa .klogin , 120access is granted to the account. 121The principal 122.Ar accountname.@localrealm 123is granted access if 124there is no 125.Pa .klogin 126file. 127Otherwise a login and password will be prompted for on the remote machine 128as in 129.Xr login 1 . 130To avoid certain security problems, the 131.Pa .klogin 132file must be owned by 133the remote user. 134.Pp 135If Kerberos authentication fails, a warning message is printed and the 136standard Berkeley 137.Nm rlogin 138is used instead. 139.Sh ENVIRONMENT 140The following environment variable is utilized by 141.Nm rlogin : 142.Bl -tag -width TERM 143.It Ev TERM 144Determines the user's terminal type. 145.El 146.Sh SEE ALSO 147.Xr rsh 1 , 148.Xr kerberos 3 , 149.Xr krb_sendauth 3 , 150.Xr krb_realmofhost 3 151.Sh HISTORY 152The 153.Nm rlogin 154command appeared in 155.Bx 4.2 . 156.Sh BUGS 157.Nm Rlogin 158will be replaced by 159.Xr telnet 1 160in the near future. 161.Pp 162More of the environment should be propagated. 163