xref: /original-bsd/usr.bin/rlogin/rlogin.1 (revision 95407d66)
1.\" Copyright (c) 1983, 1990 The Regents of the University of California.
2.\" All rights reserved.
3.\"
4.\" %sccs.include.redist.man%
5.\"
6.\"     @(#)rlogin.1	6.17.1.1 (Berkeley) 10/21/90
7.\"
8.Dd
9.Dt RLOGIN 1
10.Os BSD 4.2
11.Sh NAME
12.Nm rlogin
13.Nd remote login
14.Sh SYNOPSIS
15.Ar rlogin
16.Op Fl 8EKLd
17.Op Fl e Ar char
18.Op Fl k Ar realm
19.Op Fl l Ar username
20.Ar host
21.Sh DESCRIPTION
22.Nm Rlogin
23starts a terminal session on a remote host
24.Ar host  .
25.Pp
26.Nm Rlogin
27first attempts to use the Kerberos authorization mechanism, described below.
28If the remote host does not supporting Kerberos the standard Berkeley
29.Pa rhosts
30authorization mechanism is used.
31The options are as follows:
32.Tw Fl
33.Tp Fl 8
34The
35.Fl 8
36option allows an eight-bit input data path at all times; otherwise
37parity bits are stripped except when the remote side's stop and start
38characters are other than ^S/^Q.
39.Tp Fl E
40The
41.Fl E
42option stops any character from being recognized as an escape character.
43When used with the
44.Fl 8
45option, this provides a completely transparent connection.
46.Tp Fl K
47The
48.Fl K
49option turns off all Kerberos authentication.
50.Tp Fl L
51The
52.Fl L
53option allows the rlogin session to be run in ``litout'' (see
54.Xr tty  4  )
55mode.
56.Tp Fl d
57The
58.Fl d
59option turns on socket debugging (see
60.Xr setsockopt  2  )
61on the TCP sockets used for communication with the remote host.
62.Tp Fl e
63The
64.Fl e
65option allows user specification of the escape character, which is
66``~'' by default.
67This specification may be as a literal character, or as an octal
68value in the form \ennn.
69.Tp Fl k
70The
71.FL k
72option requests rlogin to obtain tickets for the remote host
73in realm
74.Ar realm
75instead of the remote host's realm as determined by
76.Xr krb_realmofhost  3  .
77.Tp
78.Pp
79A line of the form ``<escape char>.'' disconnects from the remote host.
80Similarly, the line ``<escape char>^Z'' will suspend the
81.Nm rlogin
82session, and ``<escape char><delayed-suspend char>'' suspends the
83send portion of the rlogin, but allows output from the remote system.
84By default, the tilde (``~'') character is the escape character, and
85normally control-Y (``^Y'') is the delayed-suspend character.
86.Pp
87All echoing takes place at the remote site, so that (except for delays)
88the
89.Nm rlogin
90is transparent.
91Flow control via ^S/^Q and flushing of input and output on interrupts
92are handled properly.
93.Sh KERBEROS AUTHENTICATION
94Each user may have a private authorization list in the file
95.Pa .klogin
96in their home directory.
97Each line in this file should contain a Kerberos principal name of the
98form
99.Ar principal.instance@realm  .
100If the originating user is authenticated to one of the principals named
101in
102.Pa .klogin ,
103access is granted to the account.
104The principal
105.Ar accountname.@localrealm
106is granted access if
107there is no
108.Pa .klogin
109file.
110Otherwise a login and password will be prompted for on the remote machine
111as in
112.Xr login  1  .
113To avoid certain security problems, the
114.Pa .klogin
115file must be owned by
116the remote user.
117.Pp
118If Kerberos authentication fails, a warning message is printed and the
119standard Berkeley
120.Em rlogin
121is used instead.
122.Sh ENVIRONMENT
123The following environment variable is utilized by
124.Nm rlogin :
125.Tw Fl
126.Tp Ev TERM
127to find user's terminal type.
128.Tp
129.Sh SEE ALSO
130.Xr rsh 1 ,
131.Xr kerberos 3 ,
132.Xr krb_sendauth 3 ,
133.Xr krb_realmofhost 3
134.Sh HISTORY
135.Nm Rlogin
136appeared in 4.2 BSD.
137.Sh BUGS
138.Nm Rlogin
139will be replaced by
140.Xr telnet  1
141in the near future.
142.Pp
143More of the environment should be propagated.
144