1.\" Copyright (c) 1983, 1990 The Regents of the University of California. 2.\" All rights reserved. 3.\" 4.\" %sccs.include.redist.man% 5.\" 6.\" @(#)rlogin.1 6.17.1.1 (Berkeley) 10/21/90 7.\" 8.Dd 9.Dt RLOGIN 1 10.Os BSD 4.2 11.Sh NAME 12.Nm rlogin 13.Nd remote login 14.Sh SYNOPSIS 15.Ar rlogin 16.Op Fl 8EKLd 17.Op Fl e Ar char 18.Op Fl k Ar realm 19.Op Fl l Ar username 20.Ar host 21.Sh DESCRIPTION 22.Nm Rlogin 23starts a terminal session on a remote host 24.Ar host . 25.Pp 26.Nm Rlogin 27first attempts to use the Kerberos authorization mechanism, described below. 28If the remote host does not supporting Kerberos the standard Berkeley 29.Pa rhosts 30authorization mechanism is used. 31The options are as follows: 32.Tw Fl 33.Tp Fl 8 34The 35.Fl 8 36option allows an eight-bit input data path at all times; otherwise 37parity bits are stripped except when the remote side's stop and start 38characters are other than ^S/^Q. 39.Tp Fl E 40The 41.Fl E 42option stops any character from being recognized as an escape character. 43When used with the 44.Fl 8 45option, this provides a completely transparent connection. 46.Tp Fl K 47The 48.Fl K 49option turns off all Kerberos authentication. 50.Tp Fl L 51The 52.Fl L 53option allows the rlogin session to be run in ``litout'' (see 54.Xr tty 4 ) 55mode. 56.Tp Fl d 57The 58.Fl d 59option turns on socket debugging (see 60.Xr setsockopt 2 ) 61on the TCP sockets used for communication with the remote host. 62.Tp Fl e 63The 64.Fl e 65option allows user specification of the escape character, which is 66``~'' by default. 67This specification may be as a literal character, or as an octal 68value in the form \ennn. 69.Tp Fl k 70The 71.FL k 72option requests rlogin to obtain tickets for the remote host 73in realm 74.Ar realm 75instead of the remote host's realm as determined by 76.Xr krb_realmofhost 3 . 77.Tp 78.Pp 79A line of the form ``<escape char>.'' disconnects from the remote host. 80Similarly, the line ``<escape char>^Z'' will suspend the 81.Nm rlogin 82session, and ``<escape char><delayed-suspend char>'' suspends the 83send portion of the rlogin, but allows output from the remote system. 84By default, the tilde (``~'') character is the escape character, and 85normally control-Y (``^Y'') is the delayed-suspend character. 86.Pp 87All echoing takes place at the remote site, so that (except for delays) 88the 89.Nm rlogin 90is transparent. 91Flow control via ^S/^Q and flushing of input and output on interrupts 92are handled properly. 93.Sh KERBEROS AUTHENTICATION 94Each user may have a private authorization list in the file 95.Pa .klogin 96in their home directory. 97Each line in this file should contain a Kerberos principal name of the 98form 99.Ar principal.instance@realm . 100If the originating user is authenticated to one of the principals named 101in 102.Pa .klogin , 103access is granted to the account. 104The principal 105.Ar accountname.@localrealm 106is granted access if 107there is no 108.Pa .klogin 109file. 110Otherwise a login and password will be prompted for on the remote machine 111as in 112.Xr login 1 . 113To avoid certain security problems, the 114.Pa .klogin 115file must be owned by 116the remote user. 117.Pp 118If Kerberos authentication fails, a warning message is printed and the 119standard Berkeley 120.Em rlogin 121is used instead. 122.Sh ENVIRONMENT 123The following environment variable is utilized by 124.Nm rlogin : 125.Tw Fl 126.Tp Ev TERM 127to find user's terminal type. 128.Tp 129.Sh SEE ALSO 130.Xr rsh 1 , 131.Xr kerberos 3 , 132.Xr krb_sendauth 3 , 133.Xr krb_realmofhost 3 134.Sh HISTORY 135.Nm Rlogin 136appeared in 4.2 BSD. 137.Sh BUGS 138.Nm Rlogin 139will be replaced by 140.Xr telnet 1 141in the near future. 142.Pp 143More of the environment should be propagated. 144