xref: /original-bsd/usr.bin/rlogin/rlogin.1 (revision 6ab384a1)
1.\" Copyright (c) 1983, 1990 The Regents of the University of California.
2.\" All rights reserved.
3.\"
4.\" %sccs.include.redist.man%
5.\"
6.\"     @(#)rlogin.1	6.17 (Berkeley) 08/23/90
7.\"
8.Dd
9.Dt RLOGIN 1
10.Os BSD 4.2
11.Sh NAME
12.Nm rlogin
13.Nd remote login
14.Sh SYNOPSIS
15.Ar rlogin
16.Op Fl 8EKLdx
17.Op Fl e Ar char
18.Op Fl k Ar realm
19.Op Fl l Ar username
20.Ar host
21.Sh DESCRIPTION
22.Nm Rlogin
23starts a terminal session on a remote host
24.Ar host  .
25.Pp
26.Nm Rlogin
27first attempts to use the Kerberos authorization mechanism, described below.
28If the remote host does not supporting Kerberos the standard Berkeley
29.Pa rhosts
30authorization mechanism is used.
31The options are as follows:
32.Tw Fl
33.Tp Fl 8
34The
35.Fl 8
36option allows an eight-bit input data path at all times; otherwise
37parity bits are stripped except when the remote side's stop and start
38characters are other than ^S/^Q.
39.Tp Fl E
40The
41.Fl E
42option stops any character from being recognized as an escape character.
43When used with the
44.Fl 8
45option, this provides a completely transparent connection.
46.Tp Fl K
47The
48.Fl K
49option turns off all Kerberos authentication.
50.Tp Fl L
51The
52.Fl L
53option allows the rlogin session to be run in ``litout'' (see
54.Xr tty  4  )
55mode.
56.Tp Fl d
57The
58.Fl d
59option turns on socket debugging (see
60.Xr setsockopt  2  )
61on the TCP sockets used for communication with the remote host.
62.Tp Fl e
63The
64.Fl e
65option allows user specification of the escape character, which is
66``~'' by default.
67This specification may be as a literal character, or as an octal
68value in the form \ennn.
69.Tp Fl k
70The
71.FL k
72option requests rlogin to obtain tickets for the remote host
73in realm
74.Ar realm
75instead of the remote host's realm as determined by
76.Xr krb_realmofhost  3  .
77.Tp Fl x
78The
79.Fl x
80option turns on DES encryption for all data passed via the
81rlogin session.
82This may impact response time and CPU utilization, but provides
83increased security.
84.Tp
85.Pp
86A line of the form ``<escape char>.'' disconnects from the remote host.
87Similarly, the line ``<escape char>^Z'' will suspend the
88.Nm rlogin
89session, and ``<escape char><delayed-suspend char>'' suspends the
90send portion of the rlogin, but allows output from the remote system.
91By default, the tilde (``~'') character is the escape character, and
92normally control-Y (``^Y'') is the delayed-suspend character.
93.Pp
94All echoing takes place at the remote site, so that (except for delays)
95the
96.Nm rlogin
97is transparent.
98Flow control via ^S/^Q and flushing of input and output on interrupts
99are handled properly.
100.Sh KERBEROS AUTHENTICATION
101Each user may have a private authorization list in the file
102.Pa .klogin
103in their home directory.
104Each line in this file should contain a Kerberos principal name of the
105form
106.Ar principal.instance@realm  .
107If the originating user is authenticated to one of the principals named
108in
109.Pa .klogin ,
110access is granted to the account.
111The principal
112.Ar accountname.@localrealm
113is granted access if
114there is no
115.Pa .klogin
116file.
117Otherwise a login and password will be prompted for on the remote machine
118as in
119.Xr login  1  .
120To avoid certain security problems, the
121.Pa .klogin
122file must be owned by
123the remote user.
124.Pp
125If Kerberos authentication fails, a warning message is printed and the
126standard Berkeley
127.Em rlogin
128is used instead.
129.Sh ENVIRONMENT
130The following environment variable is utilized by
131.Nm rlogin :
132.Tw Fl
133.Tp Ev TERM
134to find user's terminal type.
135.Tp
136.Sh SEE ALSO
137.Xr rsh 1 ,
138.Xr kerberos 3 ,
139.Xr krb_sendauth 3 ,
140.Xr krb_realmofhost 3
141.Sh HISTORY
142.Nm Rlogin
143appeared in 4.2 BSD.
144.Sh BUGS
145.Nm Rlogin
146will be replaced by
147.Xr telnet  1
148in the near future.
149.Pp
150More of the environment should be propagated.
151