1 .\" Copyright (c) 1983, 1990, 1993
2 .\" The Regents of the University of California. All rights reserved.
4 .\" Redistribution and use in source and binary forms, with or without
5 .\" modification, are permitted provided that the following conditions
7 .\" 1. Redistributions of source code must retain the above copyright
8 .\" notice, this list of conditions and the following disclaimer.
9 .\" 2. Redistributions in binary form must reproduce the above copyright
10 .\" notice, this list of conditions and the following disclaimer in the
11 .\" documentation and/or other materials provided with the distribution.
12 .\" 3. All advertising materials mentioning features or use of this software
13 .\" must display the following acknowledgement:
14 .\" This product includes software developed by the University of
15 .\" California, Berkeley and its contributors.
16 .\" 4. Neither the name of the University nor the names of its contributors
17 .\" may be used to endorse or promote products derived from this software
18 .\" without specific prior written permission.
20 .\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
21 .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22 .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23 .\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
24 .\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25 .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26 .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28 .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29 .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
32 .\" @(#)rlogin.1 8.1 (Berkeley) 6/6/93
35 .Dd September 26, 2003
51 utility starts a terminal session on a remote host
57 first attempts to use the Kerberos authorization mechanism, described below.
58 If the remote host does not support Kerberos the standard Berkeley
60 authorization mechanism is used.
62 The following options are available:
65 Use IPv4 addresses only.
67 Use IPv6 addresses only.
69 Allow an eight-bit input data path at all times; otherwise
70 parity bits are stripped except when the remote side's stop and start
71 characters are other than
74 Set the TCP_NODELAY socket option which can improve interactive response
75 at the expense of increased network load.
77 Stop any character from being recognized as an escape character.
80 option, this provides a completely transparent connection.
82 Turn on socket debugging (see
84 on the TCP sockets used for communication with the remote host.
86 Allow user specification of the escape character, which is
89 This specification may be as a literal character, or as an octal
90 value in the form \ennn.
92 Allow the caller to specify a different local name to be used
94 This option is restricted to processes with uid 0.
99 If this option is not specified, your local username will be used.
103 .Dq Ao escape char Ac Ns \&.
104 disconnects from the remote host.
106 .Dq Ao escape char Ac Ns ^Z
110 .Dq Ao escape\ char Ac Ns Ao delayed-suspend\ char Ac
114 session, but allows output from the remote system.
115 By default, the tilde
117 character is the escape character, and
120 is the delayed-suspend character.
122 All echoing takes place at the remote site, so that (except for delays)
126 Flow control via ^S/^Q and flushing of input and output on interrupts
127 are handled properly.
128 .Sh KERBEROS AUTHENTICATION
129 Each user may have a private authorization list in the file
131 in their home directory.
132 Each line in this file should contain a Kerberos principal name of the
134 .Ar principal.instance@realm .
135 If the originating user is authenticated to one of the principals named
138 access is granted to the account.
140 .Ar accountname.@localrealm
145 Otherwise a login and password will be prompted for on the remote machine
148 To avoid certain security problems, the
150 file must be owned by
153 If Kerberos authentication fails, a warning message is printed and the
158 The following environment variable is utilized by
162 Determines the user's terminal type.
170 .Xr krb_realmofhost 3 ,
180 .Bl -tag -width /etc/hosts -compact
182 .It Pa /etc/hosts.equiv
183 .It Pa /etc/auth.conf
184 .It Ev $HOME Ns Pa /.rhosts
185 .It Ev $HOME Ns Pa /.klogin
193 IPv6 support was added by WIDE/KAME project.
197 utility will be replaced by
201 More of the environment should be propagated.