<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: rsh and rlogin in Operating System - Linux</title>
    <link>https://community.hpe.com/t5/operating-system-linux/rsh-and-rlogin/m-p/4909255#M45786</link>
    <description>Hi Stuar,&lt;BR /&gt;Thanks for your time!&lt;BR /&gt;here is the output : &lt;BR /&gt;[root@uxcoedb002 etc]# ls -l ~oracle/.rhosts&lt;BR /&gt;-r--------    1 oracle   dba           145 Jun 28 15:58 /home/oracle/.rhosts&lt;BR /&gt;[root@uxcoedb002 etc]# cat ~oracle/.rhosts&lt;BR /&gt;10.49.123.22 oracle&lt;BR /&gt;10.49.123.23 oracle&lt;BR /&gt;uxcoedb001 oracle &lt;BR /&gt;uxcoedb001.coe.int oracle &lt;BR /&gt;10.49.123.22&lt;BR /&gt;10.49.123.23 &lt;BR /&gt;uxcoedb001 &lt;BR /&gt;uxcoedb001.coe.int &lt;BR /&gt;[root@uxcoedb002 etc]# cat /etc/hosts.allow&lt;BR /&gt;#&lt;BR /&gt;# hosts.allow   This file describes the names of the hosts which are&lt;BR /&gt;#               allowed to use the local INET services, as decided&lt;BR /&gt;#               by the '/usr/sbin/tcpd' server.&lt;BR /&gt;#&lt;BR /&gt;in.rshd:10.49.123.22&lt;BR /&gt;in.rlogind:10.49.123.22&lt;BR /&gt;in.rshd:uxcoedb001&lt;BR /&gt;in.rlogind:uxcoedb001&lt;BR /&gt;[root@uxcoedb002 etc]# cat /etc/hosts.allow&lt;BR /&gt;#&lt;BR /&gt;# hosts.allow   This file describes the names of the hosts which are&lt;BR /&gt;#               allowed to use the local INET services, as decided&lt;BR /&gt;#               by the '/usr/sbin/tcpd' server.&lt;BR /&gt;#&lt;BR /&gt;in.rshd:10.49.123.22&lt;BR /&gt;in.rlogind:10.49.123.22&lt;BR /&gt;in.rshd:uxcoedb001&lt;BR /&gt;in.rlogind:uxcoedb001&lt;BR /&gt;[root@uxcoedb002 etc]# ipchains -nvL&lt;BR /&gt;Chain input (policy ACCEPT: 4765 packets, 214133 bytes):&lt;BR /&gt; pkts bytes target     prot opt    tosa tosx  ifname     mark       outsize  source                destination           ports&lt;BR /&gt;    0     0 ACCEPT     tcp  -y---- 0xFF 0x00  *                              0.0.0.0/0            0.0.0.0/0             * -&amp;gt;   22&lt;BR /&gt;    5   240 ACCEPT     tcp  -y---- 0xFF 0x00  *                              0.0.0.0/0            0.0.0.0/0             * -&amp;gt;   23&lt;BR /&gt;  192 10558 ACCEPT     all  ------ 0xFF 0x00  lo                             0.0.0.0/0            0.0.0.0/0             n/a&lt;BR /&gt;  172  9672 REJECT     tcp  -y---- 0xFF 0x00  *                              0.0.0.0/0            0.0.0.0/0             * -&amp;gt;   0:1023&lt;BR /&gt;    0     0 REJECT     tcp  -y---- 0xFF 0x00  *                              0.0.0.0/0            0.0.0.0/0             * -&amp;gt;   2049&lt;BR /&gt;26386 2446K REJECT     udp  ------ 0xFF 0x00  *                              0.0.0.0/0            0.0.0.0/0             * -&amp;gt;   0:1023&lt;BR /&gt;    0     0 REJECT     udp  ------ 0xFF 0x00  *                              0.0.0.0/0            0.0.0.0/0             * -&amp;gt;   2049&lt;BR /&gt;    0     0 REJECT     tcp  -y---- 0xFF 0x00  *                              0.0.0.0/0            0.0.0.0/0             * -&amp;gt;   6000:6009&lt;BR /&gt;    0     0 REJECT     tcp  -y---- 0xFF 0x00  *                              0.0.0.0/0            0.0.0.0/0             * -&amp;gt;   7100&lt;BR /&gt;Chain forward (policy ACCEPT: 0 packets, 0 bytes):&lt;BR /&gt;Chain output (policy ACCEPT: 3228 packets, 316082 bytes):&lt;BR /&gt;</description>
    <pubDate>Tue, 28 Jun 2005 00:58:00 GMT</pubDate>
    <dc:creator>luis de carlos</dc:creator>
    <dc:date>2005-06-28T00:58:00Z</dc:date>
    <item>
      <title>rsh and rlogin</title>
      <link>https://community.hpe.com/t5/operating-system-linux/rsh-and-rlogin/m-p/4909243#M45774</link>
      <description>Hi,&lt;BR /&gt;I have two servers in lab environment, (no outside access)running RHEL 2.1 on IA64 and want to get "r" commands going from host 1 to host 2: rlogin, rsh and rcp (Security is NO issue here).&lt;BR /&gt;I have set up on hosts.equiv , .rhosts etc to no avail I get the "connection refused" message .&lt;BR /&gt;host 2 hosts.equiv and .rhosts content ... (chmod 400)&lt;BR /&gt;uxcoedb001.coe.int +&lt;BR /&gt;uxcoedb001 +&lt;BR /&gt;10.49.123.22 +&lt;BR /&gt; I have also turned xinetd service rlogin on via chkconfig and rebooted .&lt;BR /&gt;Any other clues?&lt;BR /&gt;Thank you&lt;BR /&gt;Luis</description>
      <pubDate>Mon, 27 Jun 2005 03:19:12 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/rsh-and-rlogin/m-p/4909243#M45774</guid>
      <dc:creator>luis de carlos</dc:creator>
      <dc:date>2005-06-27T03:19:12Z</dc:date>
    </item>
    <item>
      <title>Re: rsh and rlogin</title>
      <link>https://community.hpe.com/t5/operating-system-linux/rsh-and-rlogin/m-p/4909244#M45775</link>
      <description>&lt;BR /&gt;just ensure you have r* services running on your system. check it by netstat -at and look for port numbers which is generally used by rcp, rsh etc.&lt;BR /&gt;&lt;BR /&gt;also you need to have xinetd service running to handle r* services. &lt;BR /&gt;&lt;BR /&gt;A firewall may be blocking your connections&lt;BR /&gt;&lt;BR /&gt;run nmap from client to the server to find out list of ports listening and it may give you more insight on service running&lt;BR /&gt;&lt;BR /&gt;Hope this helps,&lt;BR /&gt;Gopi&lt;BR /&gt;</description>
      <pubDate>Mon, 27 Jun 2005 04:12:48 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/rsh-and-rlogin/m-p/4909244#M45775</guid>
      <dc:creator>Gopi Sekar</dc:creator>
      <dc:date>2005-06-27T04:12:48Z</dc:date>
    </item>
    <item>
      <title>Re: rsh and rlogin</title>
      <link>https://community.hpe.com/t5/operating-system-linux/rsh-and-rlogin/m-p/4909245#M45776</link>
      <description>if you've installed rsh-server,then&lt;BR /&gt;do:&lt;BR /&gt;chkconfig rsh on&lt;BR /&gt;chkconfig rlogin on&lt;BR /&gt;otherwise install rsh-server first&lt;BR /&gt;You have the rpm on installation disks</description>
      <pubDate>Mon, 27 Jun 2005 05:52:12 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/rsh-and-rlogin/m-p/4909245#M45776</guid>
      <dc:creator>Alexander Chuzhoy</dc:creator>
      <dc:date>2005-06-27T05:52:12Z</dc:date>
    </item>
    <item>
      <title>Re: rsh and rlogin</title>
      <link>https://community.hpe.com/t5/operating-system-linux/rsh-and-rlogin/m-p/4909246#M45777</link>
      <description>Also check the configuration of the firewall.&lt;BR /&gt;&lt;BR /&gt;What user are you trying to use your 'r' commands as incidentally?  If it's as 'root', you'll also need to add an entry for 'rsh' in '/etc/securetty' (just add it to a line at the bottom).</description>
      <pubDate>Mon, 27 Jun 2005 07:53:16 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/rsh-and-rlogin/m-p/4909246#M45777</guid>
      <dc:creator>Stuart Browne</dc:creator>
      <dc:date>2005-06-27T07:53:16Z</dc:date>
    </item>
    <item>
      <title>Re: rsh and rlogin</title>
      <link>https://community.hpe.com/t5/operating-system-linux/rsh-and-rlogin/m-p/4909247#M45778</link>
      <description>Hi &lt;BR /&gt;Thanks for the replies. I have NO firewall. The machines are direct connected to a private lan.&lt;BR /&gt;I try both as root and as user.&lt;BR /&gt;I have xinetd running, see below : &lt;BR /&gt;xinetd based services:&lt;BR /&gt;        chargen-udp:    off&lt;BR /&gt;        chargen:        off&lt;BR /&gt;        daytime-udp:    off&lt;BR /&gt;        daytime:        off&lt;BR /&gt;        echo-udp:       off&lt;BR /&gt;        echo:   off&lt;BR /&gt;        services:       off&lt;BR /&gt;        servers:        off&lt;BR /&gt;        time-udp:       off&lt;BR /&gt;        time:   off&lt;BR /&gt;        sgi_fam:        on&lt;BR /&gt;        finger: off&lt;BR /&gt;        rexec:  on&lt;BR /&gt;        rlogin: on&lt;BR /&gt;        rsh:    on&lt;BR /&gt;        ntalk:  off&lt;BR /&gt;        talk:   off&lt;BR /&gt;        telnet: on&lt;BR /&gt;        rsync:  off&lt;BR /&gt;have not located an entry for rlogin or rsh in the /etc/services .&lt;BR /&gt;# cat /etc/services | grep rlogin&lt;BR /&gt;klogin          543/tcp                         # Kerberized `rlogin' (v5)&lt;BR /&gt;eklogin         2105/tcp                        # Kerberos encrypted rlogin&lt;BR /&gt;kshell          544/tcp         krcmd           # Kerberized `rsh' (v5)&lt;BR /&gt;&lt;BR /&gt;I did not install Linux in these boxes, so have no idea what the previous admin did.&lt;BR /&gt;I suspect that the rshd and logind daemons should be started??? How?&lt;BR /&gt;Thanks&lt;BR /&gt;Luis&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Mon, 27 Jun 2005 18:59:12 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/rsh-and-rlogin/m-p/4909247#M45778</guid>
      <dc:creator>luis de carlos</dc:creator>
      <dc:date>2005-06-27T18:59:12Z</dc:date>
    </item>
    <item>
      <title>Re: rsh and rlogin</title>
      <link>https://community.hpe.com/t5/operating-system-linux/rsh-and-rlogin/m-p/4909248#M45779</link>
      <description>Those three entries in your services file are not the rsh/rexec/rlogin values, they are for kerberos-over-rsh/rexec/rlogin values.&lt;BR /&gt;&lt;BR /&gt;The ones you want are ports 512,513, and 514 (exec, login, shell) TCP.&lt;BR /&gt;&lt;BR /&gt;To see if they are running, use the command 'netstat -ntlp'.&lt;BR /&gt;&lt;BR /&gt;Do you have any entries in '/etc/hosts.deny' or '/etc/hosts.allow' ?  If you do, you'll need to ensure that you're opening a hole for the service you are using (most probably 'login' and 'shell'), i.e.:&lt;BR /&gt;&lt;BR /&gt;in.rshd:10.49.123.22&lt;BR /&gt;in.rlogind:10.49.123.22&lt;BR /&gt;&lt;BR /&gt;Also, the '~user/.rhosts' should only have host names in them, unlike the '/etc/hosts.equiv'.</description>
      <pubDate>Mon, 27 Jun 2005 19:16:34 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/rsh-and-rlogin/m-p/4909248#M45779</guid>
      <dc:creator>Stuart Browne</dc:creator>
      <dc:date>2005-06-27T19:16:34Z</dc:date>
    </item>
    <item>
      <title>Re: rsh and rlogin</title>
      <link>https://community.hpe.com/t5/operating-system-linux/rsh-and-rlogin/m-p/4909249#M45780</link>
      <description>Hi Stuart,&lt;BR /&gt;Thanks for the reply, this is what I get for netstat -nltp&lt;BR /&gt;[root@uxcoedb002 etc]# netstat -ntlp&lt;BR /&gt;Active Internet connections (only servers)&lt;BR /&gt;Proto Recv-Q Send-Q Local Address           Foreign Address         State       PID/Program name   &lt;BR /&gt;tcp        0      0 0.0.0.0:512             0.0.0.0:*               LISTEN      1102/xinetd         &lt;BR /&gt;tcp        0      0 0.0.0.0:32768           0.0.0.0:*               LISTEN      900/rpc.statd       &lt;BR /&gt;tcp        0      0 127.0.0.1:32769         0.0.0.0:*               LISTEN      1102/xinetd         &lt;BR /&gt;tcp        0      0 0.0.0.0:513             0.0.0.0:*               LISTEN      1102/xinetd         &lt;BR /&gt;tcp        0      0 0.0.0.0:514             0.0.0.0:*               LISTEN      1102/xinetd         &lt;BR /&gt;tcp        0      0 0.0.0.0:111             0.0.0.0:*               LISTEN      872/portmap         &lt;BR /&gt;tcp        0      0 0.0.0.0:22              0.0.0.0:*               LISTEN      1068/sshd           &lt;BR /&gt;tcp        0      0 0.0.0.0:23              0.0.0.0:*               LISTEN      1102/xinetd         &lt;BR /&gt;tcp        0      0 127.0.0.1:25            0.0.0.0:*               LISTEN      1143/sendmail: acce &lt;BR /&gt;&lt;BR /&gt;?????????&lt;BR /&gt;Should a service/daemon be explicitely started?&lt;BR /&gt;&lt;BR /&gt;I did the changes you suggested in .rhosts and hosts.allow .. and still get the same connection refused.&lt;BR /&gt;When I rlogin to the local machine (i.e to same server) I get prompted for the user password and get in ???&lt;BR /&gt;Thanks again&lt;BR /&gt;Luis</description>
      <pubDate>Mon, 27 Jun 2005 21:19:45 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/rsh-and-rlogin/m-p/4909249#M45780</guid>
      <dc:creator>luis de carlos</dc:creator>
      <dc:date>2005-06-27T21:19:45Z</dc:date>
    </item>
    <item>
      <title>Re: rsh and rlogin</title>
      <link>https://community.hpe.com/t5/operating-system-linux/rsh-and-rlogin/m-p/4909250#M45781</link>
      <description>Ok, exec, login and shell are listening:&lt;BR /&gt;&lt;BR /&gt;tcp 0 0 0.0.0.0:512 0.0.0.0:* LISTEN 1102/xinetd&lt;BR /&gt;tcp 0 0 0.0.0.0:513 0.0.0.0:* LISTEN 1102/xinetd&lt;BR /&gt;tcp 0 0 0.0.0.0:514 0.0.0.0:* LISTEN 1102/xinetd&lt;BR /&gt;&lt;BR /&gt;This is good.  As the services are designed to be launched from the SuperServer (inet/xinet), this is normal, and how it should be.&lt;BR /&gt;&lt;BR /&gt;Now, you've said that the remote machine is getting the same error still.  In the '~user/.rhosts' file, does it have the IP address or host-name (as listed in the '/etc/hosts' file) of the remote machine?&lt;BR /&gt;&lt;BR /&gt;As for the local machine not being able to rlogin to it's self, it's because you've not listed the machine's own IP in the appropriate '.rhosts' file.&lt;BR /&gt;&lt;BR /&gt;All of this being said, it's still sounding like a firewall issue.  What does 'iptables -nvL' report?&lt;BR /&gt;&lt;BR /&gt;Are there any log entries in '/var/log/messages' or '/var/log/secure' for the time when you're trying to log in?&lt;BR /&gt;&lt;BR /&gt;And you've still not answered my question about what user you're attempting to do these commands as and to.</description>
      <pubDate>Mon, 27 Jun 2005 21:26:04 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/rsh-and-rlogin/m-p/4909250#M45781</guid>
      <dc:creator>Stuart Browne</dc:creator>
      <dc:date>2005-06-27T21:26:04Z</dc:date>
    </item>
    <item>
      <title>Re: rsh and rlogin</title>
      <link>https://community.hpe.com/t5/operating-system-linux/rsh-and-rlogin/m-p/4909251#M45782</link>
      <description>&lt;BR /&gt;it sounds like firewall issue.&lt;BR /&gt;&lt;BR /&gt;as stuart mentioned just check 'iptables -L' on the server it should list three chains (input, output, forward) as ACCEPT. if there are any other entries then they are the one which may be causing the problem.&lt;BR /&gt;&lt;BR /&gt;to stop firewall run 'service iptables stop' and then try again&lt;BR /&gt;&lt;BR /&gt;Hope this helps,&lt;BR /&gt;Gopi</description>
      <pubDate>Mon, 27 Jun 2005 23:33:46 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/rsh-and-rlogin/m-p/4909251#M45782</guid>
      <dc:creator>Gopi Sekar</dc:creator>
      <dc:date>2005-06-27T23:33:46Z</dc:date>
    </item>
    <item>
      <title>Re: rsh and rlogin</title>
      <link>https://community.hpe.com/t5/operating-system-linux/rsh-and-rlogin/m-p/4909252#M45783</link>
      <description>Diagnostic:&lt;BR /&gt;&lt;BR /&gt;tail /var/log/messages on the machine you intend to rsh to.&lt;BR /&gt;&lt;BR /&gt;rsh.&lt;BR /&gt;&lt;BR /&gt;If there are no log entries, then look at network issues, such as firewall. If there are entries, post them and lets see what we can do to solve this issue.&lt;BR /&gt;&lt;BR /&gt;It is a common practice in networks I advise to block the ports on the R services, whether or not there is Internet access. The simple reason is clear text authentication, which I can't deal with.&lt;BR /&gt;&lt;BR /&gt;You might find the same functionality from openssh.&lt;BR /&gt;&lt;BR /&gt;I don't generally block port 22 on my firewall, so if it is a firewall issue, openssh will do the trick.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Mon, 27 Jun 2005 23:40:03 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/rsh-and-rlogin/m-p/4909252#M45783</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2005-06-27T23:40:03Z</dc:date>
    </item>
    <item>
      <title>Re: rsh and rlogin</title>
      <link>https://community.hpe.com/t5/operating-system-linux/rsh-and-rlogin/m-p/4909253#M45784</link>
      <description>OK, The plot Thickens !!!&lt;BR /&gt;First, answer to Stuart question : I am trying to connect as a normal user : oracle who has a valid login in both boxes ...&lt;BR /&gt;next when I run the iptables -L command I get :&lt;BR /&gt;[root@uxcoedb001 root]# iptables -nvL&lt;BR /&gt;/lib/modules/2.4.18-e.41smp/kernel/net/ipv4/netfilter/ip_tables.o: init_module: Device or resource busy&lt;BR /&gt;Hint: insmod errors can be caused by incorrect module parameters, including invalid IO or IRQ parameters&lt;BR /&gt;/lib/modules/2.4.18-e.41smp/kernel/net/ipv4/netfilter/ip_tables.o: insmod /lib/modules/2.4.18-e.41smp/kernel/net/ipv4/netfilter/ip_tables.o failed&lt;BR /&gt;/lib/modules/2.4.18-e.41smp/kernel/net/ipv4/netfilter/ip_tables.o: insmod ip_tables failed&lt;BR /&gt;iptables v1.2.5: can't initialize iptables table `filter': iptables who? (do you need to insmod?)&lt;BR /&gt;Perhaps iptables or your kernel needs to be upgraded.&lt;BR /&gt;&lt;BR /&gt;???????????????????????? &lt;BR /&gt;Well as mentioned , I am not aware of the firewall being used, I ran the services iptables stop and still no joy.&lt;BR /&gt;&lt;BR /&gt;What is more puzzling is that there are no relevant entries in either /var/log/messages or /var/log/secure (ie recorded when commands entered) even with me running rlogin -d &lt;HOST&gt; ???&lt;BR /&gt;&lt;BR /&gt;Do I have to explicitely start other service? this is the list from chkconfig&lt;BR /&gt;[root@uxcoedb002 etc]# chkconfig --list&lt;BR /&gt;keytable        0:off   1:on    2:on    3:on    4:on    5:on    6:off&lt;BR /&gt;atd             0:off   1:off   2:off   3:on    4:on    5:on    6:off&lt;BR /&gt;syslog          0:off   1:off   2:on    3:on    4:on    5:on    6:off&lt;BR /&gt;gpm             0:off   1:off   2:on    3:on    4:on    5:on    6:off&lt;BR /&gt;sendmail        0:off   1:off   2:on    3:on    4:on    5:on    6:off&lt;BR /&gt;kudzu           0:off   1:off   2:off   3:on    4:on    5:on    6:off&lt;BR /&gt;netdump-server  0:off   1:off   2:off   3:off   4:off   5:off   6:off&lt;BR /&gt;netfs           0:off   1:off   2:off   3:on    4:on    5:on    6:off&lt;BR /&gt;network         0:off   1:off   2:on    3:on    4:on    5:on    6:off&lt;BR /&gt;random          0:off   1:off   2:on    3:on    4:on    5:on    6:off&lt;BR /&gt;rawdevices      0:off   1:off   2:off   3:on    4:on    5:on    6:off&lt;BR /&gt;acpid           0:off   1:off   2:off   3:on    4:on    5:on    6:off&lt;BR /&gt;ipchains        0:off   1:off   2:on    3:on    4:on    5:on    6:off&lt;BR /&gt;iptables        0:off   1:off   2:on    3:on    4:on    5:on    6:off&lt;BR /&gt;crond           0:off   1:off   2:on    3:on    4:on    5:on    6:off&lt;BR /&gt;anacron         0:off   1:off   2:on    3:on    4:on    5:on    6:off&lt;BR /&gt;lpd             0:off   1:off   2:on    3:on    4:on    5:on    6:off&lt;BR /&gt;xfs             0:off   1:off   2:on    3:on    4:on    5:on    6:off&lt;BR /&gt;ntpd            0:off   1:off   2:off   3:off   4:off   5:off   6:off&lt;BR /&gt;portmap         0:off   1:off   2:off   3:on    4:on    5:on    6:off&lt;BR /&gt;xinetd          0:off   1:off   2:off   3:on    4:on    5:on    6:off&lt;BR /&gt;autofs          0:off   1:off   2:off   3:on    4:on    5:on    6:off&lt;BR /&gt;nfs             0:off   1:off   2:off   3:off   4:off   5:off   6:off&lt;BR /&gt;nfslock         0:off   1:off   2:off   3:on    4:on    5:on    6:off&lt;BR /&gt;identd          0:off   1:off   2:off   3:off   4:off   5:off   6:off&lt;BR /&gt;radvd           0:off   1:off   2:off   3:off   4:off   5:off   6:off&lt;BR /&gt;rwhod           0:off   1:off   2:off   3:off   4:off   5:off   6:off&lt;BR /&gt;sshd            0:off   1:off   2:on    3:on    4:on    5:on    6:off&lt;BR /&gt;rstatd          0:off   1:off   2:off   3:off   4:off   5:off   6:off&lt;BR /&gt;rusersd         0:off   1:off   2:off   3:off   4:off   5:off   6:off&lt;BR /&gt;rwalld          0:off   1:off   2:off   3:off   4:off   5:off   6:off&lt;BR /&gt;yppasswdd       0:off   1:off   2:off   3:off   4:off   5:off   6:off&lt;BR /&gt;ypserv          0:off   1:off   2:off   3:off   4:off   5:off   6:off&lt;BR /&gt;ypxfrd          0:off   1:off   2:off   3:off   4:off   5:off   6:off&lt;BR /&gt;winbind         0:off   1:off   2:off   3:off   4:off   5:off   6:off&lt;BR /&gt;smb             0:off   1:off   2:off   3:off   4:off   5:off   6:off&lt;BR /&gt;arpwatch        0:off   1:off   2:off   3:off   4:off   5:off   6:off&lt;BR /&gt;ipvsadm         0:off   1:off   2:off   3:off   4:off   5:off   6:off&lt;BR /&gt;netdump         0:off   1:off   2:off   3:off   4:off   5:off   6:off&lt;BR /&gt;snmptrapd       0:off   1:off   2:off   3:off   4:off   5:off   6:off&lt;BR /&gt;snmpd           0:off   1:off   2:off   3:off   4:off   5:off   6:off&lt;BR /&gt;rhnsd           0:off   1:off   2:off   3:on    4:on    5:on    6:off&lt;BR /&gt;isdn            0:off   1:off   2:on    3:on    4:on    5:on    6:off&lt;BR /&gt;httpd           0:off   1:off   2:off   3:off   4:off   5:off   6:off&lt;BR /&gt;squid           0:off   1:off   2:off   3:off   4:off   5:off   6:off&lt;BR /&gt;xinetd based services:&lt;BR /&gt;        chargen-udp:    off&lt;BR /&gt;        chargen:        off&lt;BR /&gt;        daytime-udp:    off&lt;BR /&gt;        daytime:        off&lt;BR /&gt;        echo-udp:       off&lt;BR /&gt;        echo:   off&lt;BR /&gt;        services:       off&lt;BR /&gt;        servers:        off&lt;BR /&gt;        time-udp:       off&lt;BR /&gt;        time:   off&lt;BR /&gt;        sgi_fam:        on&lt;BR /&gt;        finger: off&lt;BR /&gt;        rexec:  on&lt;BR /&gt;        rlogin: on&lt;BR /&gt;        rsh:    on&lt;BR /&gt;        ntalk:  off&lt;BR /&gt;        talk:   off&lt;BR /&gt;        telnet: on&lt;BR /&gt;        rsync: off &lt;BR /&gt;&lt;/HOST&gt;</description>
      <pubDate>Mon, 27 Jun 2005 23:57:31 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/rsh-and-rlogin/m-p/4909253#M45784</guid>
      <dc:creator>luis de carlos</dc:creator>
      <dc:date>2005-06-27T23:57:31Z</dc:date>
    </item>
    <item>
      <title>Re: rsh and rlogin</title>
      <link>https://community.hpe.com/t5/operating-system-linux/rsh-and-rlogin/m-p/4909254#M45785</link>
      <description>Ok, as 'iptables' didn't workk, try 'ipchains -nvL'.  It's an older method of firewalling.&lt;BR /&gt;&lt;BR /&gt;Now, we know the service is 'started and listening' (those three lines form the 'netstat -ntlp' I pasted back proove that), and no.  Once you issue 'chkconfig rsh on', it's started and listening.&lt;BR /&gt;&lt;BR /&gt;Things to verify on server machine (i.e. the one you are trying to 'rlogin' into):&lt;BR /&gt;&lt;BR /&gt;ls -l ~oracle/.rhosts&lt;BR /&gt;cat ~oracle/.rhosts&lt;BR /&gt;cat /etc/hosts.{allow,deny}&lt;BR /&gt;&lt;BR /&gt;The permissions on the '.rhosts' should be no more than 0600.  The content of the '.rhosts' file should hvae the machine-name or IP address of the remote machine, and can be pinged.&lt;BR /&gt;&lt;BR /&gt;The '/etc/hosts.allow' &amp;amp; '/etc/hosts.deny' should have enough in them to allow 'in.rshd' and 'in.rlogind' (or both be empty).&lt;BR /&gt;&lt;BR /&gt;Nothing is required on the client machine.</description>
      <pubDate>Tue, 28 Jun 2005 00:23:53 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/rsh-and-rlogin/m-p/4909254#M45785</guid>
      <dc:creator>Stuart Browne</dc:creator>
      <dc:date>2005-06-28T00:23:53Z</dc:date>
    </item>
    <item>
      <title>Re: rsh and rlogin</title>
      <link>https://community.hpe.com/t5/operating-system-linux/rsh-and-rlogin/m-p/4909255#M45786</link>
      <description>Hi Stuar,&lt;BR /&gt;Thanks for your time!&lt;BR /&gt;here is the output : &lt;BR /&gt;[root@uxcoedb002 etc]# ls -l ~oracle/.rhosts&lt;BR /&gt;-r--------    1 oracle   dba           145 Jun 28 15:58 /home/oracle/.rhosts&lt;BR /&gt;[root@uxcoedb002 etc]# cat ~oracle/.rhosts&lt;BR /&gt;10.49.123.22 oracle&lt;BR /&gt;10.49.123.23 oracle&lt;BR /&gt;uxcoedb001 oracle &lt;BR /&gt;uxcoedb001.coe.int oracle &lt;BR /&gt;10.49.123.22&lt;BR /&gt;10.49.123.23 &lt;BR /&gt;uxcoedb001 &lt;BR /&gt;uxcoedb001.coe.int &lt;BR /&gt;[root@uxcoedb002 etc]# cat /etc/hosts.allow&lt;BR /&gt;#&lt;BR /&gt;# hosts.allow   This file describes the names of the hosts which are&lt;BR /&gt;#               allowed to use the local INET services, as decided&lt;BR /&gt;#               by the '/usr/sbin/tcpd' server.&lt;BR /&gt;#&lt;BR /&gt;in.rshd:10.49.123.22&lt;BR /&gt;in.rlogind:10.49.123.22&lt;BR /&gt;in.rshd:uxcoedb001&lt;BR /&gt;in.rlogind:uxcoedb001&lt;BR /&gt;[root@uxcoedb002 etc]# cat /etc/hosts.allow&lt;BR /&gt;#&lt;BR /&gt;# hosts.allow   This file describes the names of the hosts which are&lt;BR /&gt;#               allowed to use the local INET services, as decided&lt;BR /&gt;#               by the '/usr/sbin/tcpd' server.&lt;BR /&gt;#&lt;BR /&gt;in.rshd:10.49.123.22&lt;BR /&gt;in.rlogind:10.49.123.22&lt;BR /&gt;in.rshd:uxcoedb001&lt;BR /&gt;in.rlogind:uxcoedb001&lt;BR /&gt;[root@uxcoedb002 etc]# ipchains -nvL&lt;BR /&gt;Chain input (policy ACCEPT: 4765 packets, 214133 bytes):&lt;BR /&gt; pkts bytes target     prot opt    tosa tosx  ifname     mark       outsize  source                destination           ports&lt;BR /&gt;    0     0 ACCEPT     tcp  -y---- 0xFF 0x00  *                              0.0.0.0/0            0.0.0.0/0             * -&amp;gt;   22&lt;BR /&gt;    5   240 ACCEPT     tcp  -y---- 0xFF 0x00  *                              0.0.0.0/0            0.0.0.0/0             * -&amp;gt;   23&lt;BR /&gt;  192 10558 ACCEPT     all  ------ 0xFF 0x00  lo                             0.0.0.0/0            0.0.0.0/0             n/a&lt;BR /&gt;  172  9672 REJECT     tcp  -y---- 0xFF 0x00  *                              0.0.0.0/0            0.0.0.0/0             * -&amp;gt;   0:1023&lt;BR /&gt;    0     0 REJECT     tcp  -y---- 0xFF 0x00  *                              0.0.0.0/0            0.0.0.0/0             * -&amp;gt;   2049&lt;BR /&gt;26386 2446K REJECT     udp  ------ 0xFF 0x00  *                              0.0.0.0/0            0.0.0.0/0             * -&amp;gt;   0:1023&lt;BR /&gt;    0     0 REJECT     udp  ------ 0xFF 0x00  *                              0.0.0.0/0            0.0.0.0/0             * -&amp;gt;   2049&lt;BR /&gt;    0     0 REJECT     tcp  -y---- 0xFF 0x00  *                              0.0.0.0/0            0.0.0.0/0             * -&amp;gt;   6000:6009&lt;BR /&gt;    0     0 REJECT     tcp  -y---- 0xFF 0x00  *                              0.0.0.0/0            0.0.0.0/0             * -&amp;gt;   7100&lt;BR /&gt;Chain forward (policy ACCEPT: 0 packets, 0 bytes):&lt;BR /&gt;Chain output (policy ACCEPT: 3228 packets, 316082 bytes):&lt;BR /&gt;</description>
      <pubDate>Tue, 28 Jun 2005 00:58:00 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/rsh-and-rlogin/m-p/4909255#M45786</guid>
      <dc:creator>luis de carlos</dc:creator>
      <dc:date>2005-06-28T00:58:00Z</dc:date>
    </item>
    <item>
      <title>Re: rsh and rlogin</title>
      <link>https://community.hpe.com/t5/operating-system-linux/rsh-and-rlogin/m-p/4909256#M45787</link>
      <description>ooops forgot the deny ...&lt;BR /&gt;[root@uxcoedb002 etc]# cat /etc/hosts.deny&lt;BR /&gt;#&lt;BR /&gt;# hosts.deny    This file describes the names of the hosts which are&lt;BR /&gt;#               *not* allowed to use the local INET services, as decided&lt;BR /&gt;#               by the '/usr/sbin/tcpd' server.&lt;BR /&gt;#&lt;BR /&gt;# The portmap line is redundant, but it is left to remind you that&lt;BR /&gt;# the new secure portmap uses hosts.deny and hosts.allow.  In particular&lt;BR /&gt;# you should know that NFS uses portmap!&lt;BR /&gt;&lt;BR /&gt;[root@uxcoedb002 etc]#</description>
      <pubDate>Tue, 28 Jun 2005 01:02:40 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/rsh-and-rlogin/m-p/4909256#M45787</guid>
      <dc:creator>luis de carlos</dc:creator>
      <dc:date>2005-06-28T01:02:40Z</dc:date>
    </item>
    <item>
      <title>Re: rsh and rlogin</title>
      <link>https://community.hpe.com/t5/operating-system-linux/rsh-and-rlogin/m-p/4909257#M45788</link>
      <description>And here's why:&lt;BR /&gt;&lt;BR /&gt;[root@uxcoedb002 etc]# ipchains -nvL&lt;BR /&gt;Chain input (policy ACCEPT: 4765 packets, 214133 bytes):&lt;BR /&gt;pkts bytes target prot opt tosa tosx ifname mark outsize source destination ports&lt;BR /&gt;0 0 ACCEPT tcp -y---- 0xFF 0x00 * 0.0.0.0/0 0.0.0.0/0 * -&amp;gt; 22&lt;BR /&gt;5 240 ACCEPT tcp -y---- 0xFF 0x00 * 0.0.0.0/0 0.0.0.0/0 * -&amp;gt; 23&lt;BR /&gt;192 10558 ACCEPT all ------ 0xFF 0x00 lo 0.0.0.0/0 0.0.0.0/0 n/a&lt;BR /&gt;172 9672 REJECT tcp -y---- 0xFF 0x00 * 0.0.0.0/0 0.0.0.0/0 * -&amp;gt; 0:1023&lt;BR /&gt;0 0 REJECT tcp -y---- 0xFF 0x00 * 0.0.0.0/0 0.0.0.0/0 * -&amp;gt; 2049&lt;BR /&gt;26386 2446K REJECT udp ------ 0xFF 0x00 * 0.0.0.0/0 0.0.0.0/0 * -&amp;gt; 0:1023&lt;BR /&gt;0 0 REJECT udp ------ 0xFF 0x00 * 0.0.0.0/0 0.0.0.0/0 * -&amp;gt; 2049&lt;BR /&gt;0 0 REJECT tcp -y---- 0xFF 0x00 * 0.0.0.0/0 0.0.0.0/0 * -&amp;gt; 6000:6009&lt;BR /&gt;0 0 REJECT tcp -y---- 0xFF 0x00 * 0.0.0.0/0 0.0.0.0/0 * -&amp;gt; 7100&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;In particular, this line:&lt;BR /&gt;&lt;BR /&gt;172 9672 REJECT tcp -y---- 0xFF 0x00 * 0.0.0.0/0 0.0.0.0/0 * -&amp;gt; 0:1023&lt;BR /&gt;&lt;BR /&gt;What this is doing is rejecting any packet destened for TCP ports 512-514.&lt;BR /&gt;&lt;BR /&gt;So what you need to do is insert some firewall rules to allow it through, i.e.:&lt;BR /&gt;&lt;BR /&gt;ipchains -I input -j ACCEPT -p tcp -y -d 0/0 512:514</description>
      <pubDate>Tue, 28 Jun 2005 01:08:39 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/rsh-and-rlogin/m-p/4909257#M45788</guid>
      <dc:creator>Stuart Browne</dc:creator>
      <dc:date>2005-06-28T01:08:39Z</dc:date>
    </item>
    <item>
      <title>Re: rsh and rlogin</title>
      <link>https://community.hpe.com/t5/operating-system-linux/rsh-and-rlogin/m-p/4909258#M45789</link>
      <description>Thank you so much to all, you guys were right, it was a firewall issue that I did not even knew was in place!&lt;BR /&gt;and in particular, thanks to Stuart for his time, patience and effort ...&lt;BR /&gt;Hope this helps others as well&lt;BR /&gt;Spot - on . &lt;BR /&gt;Beats me how this policy got in, but now I can work .... &lt;BR /&gt;:-)))))&lt;BR /&gt;Luis&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Tue, 28 Jun 2005 01:39:38 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-linux/rsh-and-rlogin/m-p/4909258#M45789</guid>
      <dc:creator>luis de carlos</dc:creator>
      <dc:date>2005-06-28T01:39:38Z</dc:date>
    </item>
  </channel>
</rss>

