- Community Home
- >
- Servers and Operating Systems
- >
- Operating System - HP-UX
- >
- System Administration
- >
- Re: remsh protocol to be used
-
- Forums
-
- Advancing Life & Work
- Advantage EX
- Alliances
- Around the Storage Block
- HPE Ezmeral: Uncut
- OEM Solutions
- Servers & Systems: The Right Compute
- Tech Insights
- The Cloud Experience Everywhere
- HPE Blog, Austria, Germany & Switzerland
- Blog HPE, France
- HPE Blog, Italy
- HPE Blog, Japan
- HPE Blog, Middle East
- HPE Blog, Russia
- HPE Blog, Saudi Arabia
- HPE Blog, South Africa
- HPE Blog, UK & Ireland
-
Blogs
- Advancing Life & Work
- Advantage EX
- Alliances
- Around the Storage Block
- HPE Blog, Latin America
- HPE Blog, Middle East
- HPE Blog, Saudi Arabia
- HPE Blog, South Africa
- HPE Blog, UK & Ireland
- HPE Ezmeral: Uncut
- OEM Solutions
- Servers & Systems: The Right Compute
- Tech Insights
- The Cloud Experience Everywhere
-
Information
- Community
- Welcome
- Getting Started
- FAQ
- Ranking Overview
- Rules of Participation
- Tips and Tricks
- Resources
- Announcements
- Email us
- Feedback
- Information Libraries
- Integrated Systems
- Networking
- Servers
- Storage
- Other HPE Sites
- Support Center
- Aruba Airheads Community
- Enterprise.nxt
- HPE Dev Community
- Cloud28+ Community
- Marketplace
-
Forums
-
Blogs
-
Information
-
English
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Email to a Friend
- Report Inappropriate Content
08-31-2011 06:51 AM
08-31-2011 06:51 AM
Hi ,
we have app and db split setup.
In turn to take db backup we are using remsh in our backup scripts , i would like to know whether it is secured one from audit point of view and if not then which protocol or service i should go for ??
Solved! Go to Solution.
- Tags:
- remsh
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Email to a Friend
- Report Inappropriate Content
08-31-2011 06:57 AM
08-31-2011 06:57 AM
SolutionHi:
The "r-shell" utilities are hopelessly insecure and should be replaced with SSH (of which 'scp' and 'sftp' are a part). Connection authentication and data exchange are encrypted when you use SSH. This adds a bit of CPU overhead and makes file transfers a bit slower than using the cleartext counterparts like FTP, but is a *must* in today's world.
Syntatically, changing from 'remsh' to 'ssh' is a virtual no-brainer.
Regards!
...JRF...
- Tags:
- ssh
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Email to a Friend
- Report Inappropriate Content
08-31-2011 12:15 PM
08-31-2011 12:15 PM
Re: remsh protocol to be used
Hey;
To reiterate for emphasis, No, the UNIX r-commands *are not* secure from an audit perspective or any other. All the network traffic is in the clear and there is little or no authentication. As stated, you need to use secure shell (ssh) in place of any/all of the unix-r commands as well as telnet and ftp.
Check out the users' guide at http://www.olearycomputers.com/ll/ssh_guide.html for instructions on how to use ssh up to and including publick key authentication which you'll need in order to secure your back up scripts.
Hope that helps. Post additional questions if and as needed.
Doug O"Leary
------
Senior UNIX Admin
O'Leary Computers Inc
linkedin: http://www.linkedin.com/dkoleary
Resume: http://www.olearycomputers.com/resume.html
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Email to a Friend
- Report Inappropriate Content
08-31-2011 11:33 PM
08-31-2011 11:33 PM
Re: remsh protocol to be used
Hewlett Packard Enterprise International
- Communities
- HPE Blogs and Forum
© Copyright 2021 Hewlett Packard Enterprise Development LP