Anne Wilson wrote:
I've tried several recommendations to enable 'rsh' for the user
'root'. I know about the pitfalls and dangers or doing same, but I
must have this because of particular need for the software suites I am
running.
I am able to run 'rsh' just fine for all other users. It's just for
'root' that I am facing problems.
I've attempted by adding 'rsh', 'rlogin', 'rexec' in /etc/securetty
file, i.e. first three lines. Didn't help.
I've attempted by adding the 'server_options = o' & 'server_options =
-o' in the /etc/xinitd.d/rsh file. Didn't help.
On running the following,
# rsh <myhostname> pwd
I get:
Trying krb4 rsh...
krb_sendauth failed: You have no tickets cached
trying normal rsh (/usr/bin/rsh)
Permission denied.
Also, if someone is aware of how to disable the feature of rsh to
attempt connection using Kerberos ?
I'm not a coder, so perhaps I'm misunderstanding you, but isn't the usual
recommendation for security that you should ssh log in as user, then su to
root?
That's assuming the thing on the other end is capable of running ssh.
It has been a while since I've had to use anything that isn't but I'm
sure such things still exist.
If you look at your $PATH you'll understand why the kerberos versions of
things run, although I've never understood why that is the default for
everyone. The permission denied part appears to be coming after the
normal rsh command runs and it is failing because you don't have a
suitable .rhosts file entry on the target machine to permit commands
from your source machine.
--
Les Mikesell
lesmikesell@xxxxxxxxx