PreviousNext

rlogind(8sec)

Remote login server

Synopsis

rlogind [-aknx]

Options

-k
Allow Kerberos V5 with the .k5login access control file to be trusted. If this authentication system is used by the client and the authorization check passes, the user is allowed to log in.

-n
Disable keep-alive messages.

-x
Create an encrypted session. This option is subject to export control.

Description

The rlogind server is the server for the rlogin(8sec) program. It is based on rlogind(8sec), but uses Kerberos authentication. rlogind is configured by command line arguments passed by inetd.

The rlogind server is invoked by inetd(8c) when inetd receives a connection on the port indicated in /etc/inetd.conf. A typical /etc/inetd.conf configuration line for rlogind might be as follows:

klogin stream tcp nowait root /opt/dcelocal/etc/rlogind rlogind -k

To prevent non-secure access, comment out the entry for login in /etc/inetd.conf to deny non-Kerberos access.

When rlogind receives a service request, it first checks Kerberos authentication and then checks authorization via the access-control file .k5login in the users home directory. If the authentication and authorization succeeds, rlogind

· Allocates a pseudo terminal (see pty(4))

· Manipulates file descriptors so that the slave half of the pseudo terminal becomes the stdin, stdout, and stderr for a login process

· Invokes login(1) program with the -f option

If automatic authentication fails, the user is prompted to log in as if on a standard terminal line.

If ticket forwarding is requested by the rlogin client, k5dcelogin(8sec) is invoked by rlogind to promote the forwarded Kerberos credentials to DCE credentials. The login process is then invoked by k5dcelogin.

The parent of the login process manipulates the master side of the pseudo terminal, operating as an intermediary between the login process and the client instance of the rlogin program.

In normal operation, the packet protocol described in pty(4) is invoked to provide ^S/^Q type facilities and to propagate interrupt signals to the remote programs. The login process propagates the client terminal baud rate and terminal type (found in the environment variable, TERM). See environ(7). The screen or window size of the terminal is requested from the client, and the window size changes from the client are propagated to the pseudo terminal.

Transport-level keepalive messages are enabled unless the -n option is specified. The use of keepalive messages allows sessions to be timed out if the client crashes or becomes unreachable.

Diagnostics

All initial diagnostic messages are indicated by a leading byte with a value of 1, after which any network connections are closed. If there are no errors before login is invoked, a null byte is returned to indicate success.

Try again
A fork by the server failed.

fork: No more processes..
The server was unable to fork a process to handle the incoming connection.

Wait a period of time and try again. If this message persists, the servers host may have runaway processes that are using all the entries in the process table.

Out of ptys
The server was unable to obtain a pseudo-terminal for use with the login process. Either all pseudo-terminals were in use or the pty driver has not been properly set up.

Check the pty configuration of the host where rlogind executes.

Permission denied
The server denied access because the client was not using a reserved port. This should only happen to interlopers trying to break into the system.

system call: cause_of_failure
An error in executing a system call. A message specifying the cause of the failure is appended to this error.

/usr/bin/login: reason
The login program could not be started via exec(2) for the reason indicated.

Try to correct the condition causing the problem. If this message persists, contact your system administrator.

rcmd: connect : hostname: Connection refused.
This generic message could be due to a number of reasons. One of the reasons is that the entry for login is not present in /etc/inetd.conf. The entry may have been removed or commented out to prevent non-secure access.

Kerberos authentication failed
An error occurred during Kerberos authentication. The Kerberos-specific error message will be appended to the error message.

User remote username is not authorized to login to account local username
An error occurred during Kerberos authorization. The Kerberos-specific error message will be appended to the error message.

Related Information

Commands:

rlogind(8sec)

rlogin(8sec)

Files: .k5login