Deleted Added
full compact
rlogin.1 (131491) rlogin.1 (131507)
1.\" Copyright (c) 1983, 1990, 1993
2.\" The Regents of the University of California. All rights reserved.
3.\"
4.\" Redistribution and use in source and binary forms, with or without
5.\" modification, are permitted provided that the following conditions
6.\" are met:
7.\" 1. Redistributions of source code must retain the above copyright
8.\" notice, this list of conditions and the following disclaimer.

--- 16 unchanged lines hidden (view full) ---

25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30.\" SUCH DAMAGE.
31.\"
32.\" @(#)rlogin.1 8.1 (Berkeley) 6/6/93
1.\" Copyright (c) 1983, 1990, 1993
2.\" The Regents of the University of California. All rights reserved.
3.\"
4.\" Redistribution and use in source and binary forms, with or without
5.\" modification, are permitted provided that the following conditions
6.\" are met:
7.\" 1. Redistributions of source code must retain the above copyright
8.\" notice, this list of conditions and the following disclaimer.

--- 16 unchanged lines hidden (view full) ---

25.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30.\" SUCH DAMAGE.
31.\"
32.\" @(#)rlogin.1 8.1 (Berkeley) 6/6/93
33.\" $FreeBSD: head/usr.bin/rlogin/rlogin.1 131491 2004-07-02 22:22:35Z ru $
33.\" $FreeBSD: head/usr.bin/rlogin/rlogin.1 131507 2004-07-03 00:24:45Z ru $
34.\"
35.Dd September 26, 2003
36.Dt RLOGIN 1
37.Os
38.Sh NAME
39.Nm rlogin
40.Nd remote login
41.Sh SYNOPSIS
42.Ar rlogin
43.Op Fl 468DEd
44.Op Fl e Ar char
45.Op Fl i Ar localname
46.Op Fl l Ar username
47.Ar host
48.Sh DESCRIPTION
49The
50.Nm
51utility starts a terminal session on a remote host
34.\"
35.Dd September 26, 2003
36.Dt RLOGIN 1
37.Os
38.Sh NAME
39.Nm rlogin
40.Nd remote login
41.Sh SYNOPSIS
42.Ar rlogin
43.Op Fl 468DEd
44.Op Fl e Ar char
45.Op Fl i Ar localname
46.Op Fl l Ar username
47.Ar host
48.Sh DESCRIPTION
49The
50.Nm
51utility starts a terminal session on a remote host
52.Ar host .
52.Ar host .
53.Pp
54The
55.Nm
56utility
57first attempts to use the Kerberos authorization mechanism, described below.
58If the remote host does not support Kerberos the standard Berkeley
59.Pa rhosts
60authorization mechanism is used.

--- 65 unchanged lines hidden (view full) ---

126Flow control via ^S/^Q and flushing of input and output on interrupts
127are handled properly.
128.Sh KERBEROS AUTHENTICATION
129Each user may have a private authorization list in the file
130.Pa .klogin
131in their home directory.
132Each line in this file should contain a Kerberos principal name of the
133form
53.Pp
54The
55.Nm
56utility
57first attempts to use the Kerberos authorization mechanism, described below.
58If the remote host does not support Kerberos the standard Berkeley
59.Pa rhosts
60authorization mechanism is used.

--- 65 unchanged lines hidden (view full) ---

126Flow control via ^S/^Q and flushing of input and output on interrupts
127are handled properly.
128.Sh KERBEROS AUTHENTICATION
129Each user may have a private authorization list in the file
130.Pa .klogin
131in their home directory.
132Each line in this file should contain a Kerberos principal name of the
133form
134.Ar principal.instance@realm .
134.Ar principal.instance@realm .
135If the originating user is authenticated to one of the principals named
136in
137.Pa .klogin ,
138access is granted to the account.
139The principal
140.Ar accountname.@localrealm
141is granted access if
142there is no
143.Pa .klogin
144file.
145Otherwise a login and password will be prompted for on the remote machine
146as in
135If the originating user is authenticated to one of the principals named
136in
137.Pa .klogin ,
138access is granted to the account.
139The principal
140.Ar accountname.@localrealm
141is granted access if
142there is no
143.Pa .klogin
144file.
145Otherwise a login and password will be prompted for on the remote machine
146as in
147.Xr login 1 .
147.Xr login 1 .
148To avoid certain security problems, the
149.Pa .klogin
150file must be owned by
151the remote user.
152.Pp
153If Kerberos authentication fails, a warning message is printed and the
154standard Berkeley
155.Nm

--- 34 unchanged lines hidden (view full) ---

190command appeared in
191.Bx 4.2 .
192.Pp
193IPv6 support was added by WIDE/KAME project.
194.Sh BUGS
195The
196.Nm
197utility will be replaced by
148To avoid certain security problems, the
149.Pa .klogin
150file must be owned by
151the remote user.
152.Pp
153If Kerberos authentication fails, a warning message is printed and the
154standard Berkeley
155.Nm

--- 34 unchanged lines hidden (view full) ---

190command appeared in
191.Bx 4.2 .
192.Pp
193IPv6 support was added by WIDE/KAME project.
194.Sh BUGS
195The
196.Nm
197utility will be replaced by
198.Xr telnet 1
198.Xr telnet 1
199in the near future.
200.Pp
201More of the environment should be propagated.
199in the near future.
200.Pp
201More of the environment should be propagated.