1.\" Copyright (c) 1983, 1990 The Regents of the University of California. 2.\" All rights reserved. 3.\" 4.\" %sccs.include.redist.roff% 5.\" 6.\" @(#)rlogin.1 6.19.1.1 (Berkeley) 08/20/91 7.\" 8.Dd 9.Dt RLOGIN 1 10.Os BSD 4.2 11.Sh NAME 12.Nm rlogin 13.Nd remote login 14.Sh SYNOPSIS 15.Ar rlogin 16.Op Fl 8EKLd 17.Op Fl e Ar char 18.Op Fl k Ar realm 19.Op Fl l Ar username 20.Ar host 21.Sh DESCRIPTION 22.Nm Rlogin 23starts a terminal session on a remote host 24.Ar host . 25.Pp 26.Nm Rlogin 27first attempts to use the Kerberos authorization mechanism, described below. 28If the remote host does not supporting Kerberos the standard Berkeley 29.Pa rhosts 30authorization mechanism is used. 31The options are as follows: 32.Bl -tag -width flag 33.It Fl 8 34The 35.Fl 8 36option allows an eight-bit input data path at all times; otherwise 37parity bits are stripped except when the remote side's stop and start 38characters are other than 39^S/^Q . 40.It Fl E 41The 42.Fl E 43option stops any character from being recognized as an escape character. 44When used with the 45.Fl 8 46option, this provides a completely transparent connection. 47.It Fl K 48The 49.Fl K 50option turns off all Kerberos authentication. 51.It Fl L 52The 53.Fl L 54option allows the rlogin session to be run in ``litout'' (see 55.Xr tty 4 ) 56mode. 57.It Fl d 58The 59.Fl d 60option turns on socket debugging (see 61.Xr setsockopt 2 ) 62on the TCP sockets used for communication with the remote host. 63.It Fl e 64The 65.Fl e 66option allows user specification of the escape character, which is 67``~'' by default. 68This specification may be as a literal character, or as an octal 69value in the form \ennn. 70.It Fl k 71The 72.FL k 73option requests rlogin to obtain tickets for the remote host 74in realm 75.Ar realm 76instead of the remote host's realm as determined by 77.Xr krb_realmofhost 3 . 78.El 79.Pp 80A line of the form ``<escape char>.'' disconnects from the remote host. 81Similarly, the line ``<escape char>^Z'' will suspend the 82.Nm rlogin 83session, and ``<escape char><delayed-suspend char>'' suspends the 84send portion of the rlogin, but allows output from the remote system. 85By default, the tilde (``~'') character is the escape character, and 86normally control-Y (``^Y'') is the delayed-suspend character. 87.Pp 88All echoing takes place at the remote site, so that (except for delays) 89the 90.Nm rlogin 91is transparent. 92Flow control via ^S/^Q and flushing of input and output on interrupts 93are handled properly. 94.Sh KERBEROS AUTHENTICATION 95Each user may have a private authorization list in the file 96.Pa .klogin 97in their home directory. 98Each line in this file should contain a Kerberos principal name of the 99form 100.Ar principal.instance@realm . 101If the originating user is authenticated to one of the principals named 102in 103.Pa .klogin , 104access is granted to the account. 105The principal 106.Ar accountname.@localrealm 107is granted access if 108there is no 109.Pa .klogin 110file. 111Otherwise a login and password will be prompted for on the remote machine 112as in 113.Xr login 1 . 114To avoid certain security problems, the 115.Pa .klogin 116file must be owned by 117the remote user. 118.Pp 119If Kerberos authentication fails, a warning message is printed and the 120standard Berkeley 121.Nm rlogin 122is used instead. 123.Sh ENVIRONMENT 124The following environment variable is utilized by 125.Nm rlogin : 126.Bl -tag -width TERM 127.It Ev TERM 128Determines the user's terminal type. 129.El 130.Sh SEE ALSO 131.Xr rsh 1 , 132.Xr kerberos 3 , 133.Xr krb_sendauth 3 , 134.Xr krb_realmofhost 3 135.Sh HISTORY 136The 137.Nm rlogin 138command appeared in 139.Bx 4.2 . 140.Sh BUGS 141.Nm Rlogin 142will be replaced by 143.Xr telnet 1 144in the near future. 145.Pp 146More of the environment should be propagated. 147