- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - OpenVMS
- >
- Re: get help on bypass the password on WindowXP re...
Operating System - OpenVMS
1753479
Members
4885
Online
108794
Solutions
Forums
Categories
Company
Local Language
юдл
back
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Discussions
Discussions
Forums
Forums
Discussions
юдл
back
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Blogs
Information
Community
Resources
Community Language
Language
Forums
Blogs
Go to solution
Topic Options
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО01-29-2008 11:42 AM
тАО01-29-2008 11:42 AM
I execute the rexec command on the WindowXP laptop to our VMS (8.3) system. It prompts for the login account password when starts the connection. I try to use the rcmd on our Unix system and connect to the same VMS system. It can bypass the password. Does anybody know that I missed some setting on WindowXP or the VMS tcpip configuration?
Solved! Go to Solution.
3 REPLIES 3
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО01-29-2008 12:36 PM
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО01-29-2008 01:02 PM
тАО01-29-2008 01:02 PM
Re: get help on bypass the password on WindowXP rexec command to VMS
Ideally, you'd provide some identity info on
the IP software used on the VMS system (of
which there is more than one possibility).
Assuming that it's HP's TCPIP, you could try
TCPIP SHOW VERSION
On a UNIX-like server, a user can create a
"~/.rhosts" file to permit rsh/rexec access
without a password. With TCPIP, the system
manager, not the user, controls this by
creating "Communication Proxies" in the TCPIP
proxy data base. (TCPIP ADD PROXY, as
already suggested.)
It may also be possible to use SSH instead of
rsh/rexec, which can give the user a bit more
control, if public-key authorization is used.
the IP software used on the VMS system (of
which there is more than one possibility).
Assuming that it's HP's TCPIP, you could try
TCPIP SHOW VERSION
On a UNIX-like server, a user can create a
"~/.rhosts" file to permit rsh/rexec access
without a password. With TCPIP, the system
manager, not the user, controls this by
creating "Communication Proxies" in the TCPIP
proxy data base. (TCPIP ADD PROXY, as
already suggested.)
It may also be possible to use SSH instead of
rsh/rexec, which can give the user a bit more
control, if public-key authorization is used.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО01-29-2008 03:20 PM
тАО01-29-2008 03:20 PM
Re: get help on bypass the password on WindowXP rexec command to VMS
Desmond,
As others have said, SSH is a more secure mechanism, but proxies are a bit simpler.
You need to tell TCPIP on the OpenVMS system to allow connections from a particular source - usually a node/user pair.
The tricky part is, depending on the network topology and operating systems involved, you may find the source node is not what you expect (for example, if you traverse a firewall, or proxy server to get to the target you'll see the proxy as the perceived source). Some systems might not send a source username.
Start by TELNETting into your host, giving the username and password for the target account. Check the source node with:
$ SHOW LOGICAL SYS$REM_NODE
Now check the source username with:
$ WRITE SYS$OUTPUT F$GETDVI("TT","TT_ACCPORNAM")
If there is a perceived source username, it will be after the slash "/" character.
You can now define a proxy:
$ TCPIP ADD PROXY /HOST= /REMOTE_USER=
If there is no source user in the TT_ACCPORNAM string, you'll need to use "*" to indicate "any user".
Be careful with wildcards. If you have a proxy or firewall, with a "*" you may be granting access to virtually anyone!
As others have said, SSH is a more secure mechanism, but proxies are a bit simpler.
You need to tell TCPIP on the OpenVMS system to allow connections from a particular source - usually a node/user pair.
The tricky part is, depending on the network topology and operating systems involved, you may find the source node is not what you expect (for example, if you traverse a firewall, or proxy server to get to the target you'll see the proxy as the perceived source). Some systems might not send a source username.
Start by TELNETting into your host, giving the username and password for the target account. Check the source node with:
$ SHOW LOGICAL SYS$REM_NODE
Now check the source username with:
$ WRITE SYS$OUTPUT F$GETDVI("TT","TT_ACCPORNAM")
If there is a perceived source username, it will be after the slash "/" character.
You can now define a proxy:
$ TCPIP ADD PROXY
If there is no source user in the TT_ACCPORNAM string, you'll need to use "*" to indicate "any user".
Be careful with wildcards. If you have a proxy or firewall, with a "*" you may be granting access to virtually anyone!
A crucible of informative mistakes
The opinions expressed above are the personal opinions of the authors, not of Hewlett Packard Enterprise. By using this site, you accept the Terms of Use and Rules of Participation.
News and Events
Support
© Copyright 2024 Hewlett Packard Enterprise Development LP