1.\" Copyright (c) 1983, 1990 The Regents of the University of California. 2.\" All rights reserved. 3.\" 4.\" %sccs.include.redist.man% 5.\" 6.\" @(#)rlogin.1 6.17 (Berkeley) 08/23/90 7.\" 8.Dd 9.Dt RLOGIN 1 10.Os BSD 4.2 11.Sh NAME 12.Nm rlogin 13.Nd remote login 14.Sh SYNOPSIS 15.Ar rlogin 16.Op Fl 8EKLdx 17.Op Fl e Ar char 18.Op Fl k Ar realm 19.Op Fl l Ar username 20.Ar host 21.Sh DESCRIPTION 22.Nm Rlogin 23starts a terminal session on a remote host 24.Ar host . 25.Pp 26.Nm Rlogin 27first attempts to use the Kerberos authorization mechanism, described below. 28If the remote host does not supporting Kerberos the standard Berkeley 29.Pa rhosts 30authorization mechanism is used. 31The options are as follows: 32.Tw Fl 33.Tp Fl 8 34The 35.Fl 8 36option allows an eight-bit input data path at all times; otherwise 37parity bits are stripped except when the remote side's stop and start 38characters are other than ^S/^Q. 39.Tp Fl E 40The 41.Fl E 42option stops any character from being recognized as an escape character. 43When used with the 44.Fl 8 45option, this provides a completely transparent connection. 46.Tp Fl K 47The 48.Fl K 49option turns off all Kerberos authentication. 50.Tp Fl L 51The 52.Fl L 53option allows the rlogin session to be run in ``litout'' (see 54.Xr tty 4 ) 55mode. 56.Tp Fl d 57The 58.Fl d 59option turns on socket debugging (see 60.Xr setsockopt 2 ) 61on the TCP sockets used for communication with the remote host. 62.Tp Fl e 63The 64.Fl e 65option allows user specification of the escape character, which is 66``~'' by default. 67This specification may be as a literal character, or as an octal 68value in the form \ennn. 69.Tp Fl k 70The 71.FL k 72option requests rlogin to obtain tickets for the remote host 73in realm 74.Ar realm 75instead of the remote host's realm as determined by 76.Xr krb_realmofhost 3 . 77.Tp Fl x 78The 79.Fl x 80option turns on DES encryption for all data passed via the 81rlogin session. 82This may impact response time and CPU utilization, but provides 83increased security. 84.Tp 85.Pp 86A line of the form ``<escape char>.'' disconnects from the remote host. 87Similarly, the line ``<escape char>^Z'' will suspend the 88.Nm rlogin 89session, and ``<escape char><delayed-suspend char>'' suspends the 90send portion of the rlogin, but allows output from the remote system. 91By default, the tilde (``~'') character is the escape character, and 92normally control-Y (``^Y'') is the delayed-suspend character. 93.Pp 94All echoing takes place at the remote site, so that (except for delays) 95the 96.Nm rlogin 97is transparent. 98Flow control via ^S/^Q and flushing of input and output on interrupts 99are handled properly. 100.Sh KERBEROS AUTHENTICATION 101Each user may have a private authorization list in the file 102.Pa .klogin 103in their home directory. 104Each line in this file should contain a Kerberos principal name of the 105form 106.Ar principal.instance@realm . 107If the originating user is authenticated to one of the principals named 108in 109.Pa .klogin , 110access is granted to the account. 111The principal 112.Ar accountname.@localrealm 113is granted access if 114there is no 115.Pa .klogin 116file. 117Otherwise a login and password will be prompted for on the remote machine 118as in 119.Xr login 1 . 120To avoid certain security problems, the 121.Pa .klogin 122file must be owned by 123the remote user. 124.Pp 125If Kerberos authentication fails, a warning message is printed and the 126standard Berkeley 127.Em rlogin 128is used instead. 129.Sh ENVIRONMENT 130The following environment variable is utilized by 131.Nm rlogin : 132.Tw Fl 133.Tp Ev TERM 134to find user's terminal type. 135.Tp 136.Sh SEE ALSO 137.Xr rsh 1 , 138.Xr kerberos 3 , 139.Xr krb_sendauth 3 , 140.Xr krb_realmofhost 3 141.Sh HISTORY 142.Nm Rlogin 143appeared in 4.2 BSD. 144.Sh BUGS 145.Nm Rlogin 146will be replaced by 147.Xr telnet 1 148in the near future. 149.Pp 150More of the environment should be propagated. 151