■
■
Restoring the password requirement between AIX, HP-UX,
and Solaris systems
To restore the password requirement between AIX, HP-UX, and Solaris
systems
◆
Restoring the password requirement between Linux systems
To restore the password requirement between Linux systems
◆
Configuring rsh or remsh
The rsh (remote shell) program lets you log on to and execute commands on a
remote system. The remote system on which the rsh executes the command
must be running the rsh daemon.
The rsh program is not secure for network use, because it sends unencrypted
information over the network. The ssh program is the preferred method of
remote communication because it is more secure than the rsh suite of protocols.
See
If you run rsh with the basename "remsh," rsh checks for the file
/usr/bin/remsh. If this file exists, rsh uses remsh is an alias for rsh. If
/usr/bin/remsh does not exist, rsh uses remsh as a host name.
Before you enable rsh, read the rsh documentation and online manual pages. If
you have questions or issues about your rsh configuration, see the operating
system documentation.
Configuring rsh on Solaris
To configure rsh on Solaris
1
■
"Restoring the password requirement between AIX, HP-UX, and Solaris
systems"
"Restoring the password requirement between Linux
Remove the id_dsa.pub.hostname entry you appended to the file
/.ssh/authorized_keys on all systems where you added it.
Remove the id_dsa.pub.hostname entry you appended to the file
/root/.ssh/authorized_keys2 on all systems where you added it.
"Configuring
ssh" on page 26.
Determine the rsh/rlogin status. Do one of the following:
On Solaris 10, enter the following:
inetadm | grep -i login
Getting ready to install VCS One
Configuring ssh, rsh, or remsh before installing
systems"
29