Berkeley r-commands

Berkeley r-commands
Developer(s)Computer Systems Research Group at the University of California, Berkeley
Initial releaseJune 1981; 43 years ago (1981-06)
Operating systemUnix and Unix-like
TypeCommand suite
LicenseBSD

The Berkeley r-commands are a suite of computer programs designed to enable users of one Unix system to log in or issue commands to another Unix computer via TCP/IP computer network.[1] The r-commands were developed in 1982 by the Computer Systems Research Group at the University of California, Berkeley, based on an early implementation of TCP/IP (the protocol stack of the Internet).[2]

The CSRG incorporated the r-commands into their Unix operating system, the Berkeley Software Distribution (BSD). The r-commands premiered in BSD v4.1.[2] Among the programs in the suite are: rcp (remote copy), rexec (remote execution), rlogin (remote login), rsh (remote shell), rstat, ruptime, and rwho (remote who).[2][3]

The r-commands were a significant innovation, and became de facto standards for Unix operating systems.[4][5] With wider public adoption of the Internet, their inherent security vulnerabilities became a problem,[6] and beginning with the development of Secure Shell protocols and applications in 1995, its adoption entirely supplanted the deployment and use of r-commands (and Telnet) on networked systems.[7]

Overview
Service Port Transport Refs
Client Daemon
rcp rshd 514 TCP
rexec rexecd 512 TCP [8]
rlogin rlogind 513 TCP [9]
rsh rshd 514 TCP
rstat rstatd UDP
ruptime rwhod 513 UDP [10]
rwho [9][10]

Protocol

The original Berkeley package that provides rlogin also features rcp (remote-copy, allowing files to be copied over the network) and rsh (remote-shell, allowing commands to be run on a remote machine without the user logging into it).

As an example, the protocol is as follows:[11]

Client:
<null>
user name on the client<null>
user name on the server<null>
terminal type/terminal baud rate<null>

Server:

The server would check that the user should have access. If so, it returns a message with nothing in it (not even a null character), meaning the connection is established. For example:

Client:
<null>
bostic<null>
kbostic<null>
vt100/9600<null>

Server:

Both rlogin and rsh share the /etc/hosts.equiv (applies to all users on the server) and $HOME/.rhosts (applies to only the user that puts the file in its home folder) access-control scheme, although they connect to different daemons. rlogin connects to rlogind, while rsh connects to rshd. hosts.equiv and .rhosts uses the same format. The following shows some aspects of the format:[12][13]

host1
host2 user_a
-host3
+@group1 -user_b
-@group2

This allows all users from host1 to login, user_a from host2 to login, no users from host3, all users on group1 except user_b, and no users on group2.

Commands

rlogin

rlogin enables a user to log in on another server via computer network, using TCP network port 513.

rlogin is also the name of the application layer protocol used by the software, part of the TCP/IP protocol suite. Authenticated users can act as if they were physically present at the computer. RFC 1282, in which it was defined, states: "The rlogin facility provides a remote-echoed, locally flow-controlled virtual terminal with proper flushing of output." rlogin communicates with a daemon, rlogind, on the remote host. rlogin is similar to the Telnet command, but is not as customizable and is able to connect only to Unix-like hosts.

rsh

rsh opens a shell on a remote computer without a login procedure. Once connected, the user can execute commands on the remote computer through the shell's command-line interface. rsh passes input and output through the standard streams, and it sends standard output to the user's console. Over the network, standard input and standard out flow through TCP port 514, while Standard Error flows through a different TCP port, which the rsh daemon (rshd) opens.[14]

rexec

Like rsh, rexec enables the user to run shell commands on a remote computer. However, unlike the rsh server, the rexec server (rexecd) requires login: it authenticates users by reading the username and password (unencrypted) from the network socket.[15] rexec uses TCP port 512.

rcp

rcp can copy a file or directory from the local system to a remote system, from a remote system to the local system, or from one remote system to another.[16] The command line arguments of cp and rcp are similar, but in rcp remote files are prefixed with the name of the remote system:

rcp file.txt subdomain.domain:~/home/foo/file.txt

As with the Unix copy command cp, rcp overwrites an existing file of the same name in the target; unlike cp, it provides no mechanism for warning the user before overwriting the target file.[16] Like rsh, rcp uses TCP port 514.[17]

rwho

Just as the who command lists the users who are logged in to the local Unix system, rwho lists those users who are logged into all multi-user Unix systems on the local network.[18] rwho's daemon, rwhod, maintains a database of the status of Unix systems on the local network. The daemon and its database are also used by the ruptime program.[19]

rstat

rstat returns performance statistics from the kernel.

ruptime

Just as the uptime command shows how long a Unix system has been running since the last restart, ruptime requests a status report from all computers on the local network. It then returns the uptime report. If a computer did not respond within the time limit, then ruptime reports that the system is down.[20] This information is tracked and stored by the daemon rwhod, which is also used by the rwho command.[19]

Security

Those r-commands which involve user authentication (rcp, rexec, rlogin, and rsh) share several serious security vulnerabilities:

  • All information, including passwords, is transmitted unencrypted (making it vulnerable to interception).
  • The .rlogin (or .rhosts) file is easy to misuse. They are designed to allow logins without a password, but their reliance on remote usernames, hostnames, and IP addresses is exploitable. For this reason many corporate system administrators prohibit .rhosts files, and actively scrutinize their networks for offenders.
  • The protocol partly relies on the remote party's rlogin client to provide information honestly, including source port and source host name. A malicious client can forge this and gain access, as the rlogin protocol has no means of authenticating the client is running on a trusted machine. It also cannot check if the requesting client on a trusted machine is the real rlogin client, meaning that malicious programs may pretend to be a standard-conforming rlogin client by using the same protocols.
  • The common practice of mounting users' home directories via Network File System exposes rlogin to attack by means of fake .rhosts files - this means that any of its security faults automatically plague rlogin.

Due to these problems, the r-commands fell into relative disuse (with many Unix and Linux distributions no longer including them by default). Many networks that formerly relied on rlogin and telnet have replaced them with SSH and its rlogin-equivalent slogin.[21][22]

See also

Notes

  1. ^ Horwitz, Jeff (2003) [2002]. "Using the Berkeley r-commands Without a Password". Unix System Management: Primer Plus. Sams Publishing. p. 339. ISBN 978-0-672-32372-0. Retrieved 2018-03-04 – via Google Books.
  2. ^ a b c McKusick, Marshall Kirk (1999). "Twenty Years of Berkeley Unix: From AT&T-Owned to Freely Redistributable". Open Sources: Voices from the Open Source Revolution. O'Reilly & Associates. Section: "4.2BSD". ISBN 978-1-56592-582-3. Retrieved 2018-03-03.
  3. ^ Pyles, James; Carrell, Jeffrey L.; Tittel, Ed (2017). "Which IP Services Are Most Vulnerable?". Guide to TCP/IP: IPv6 and IPv4 (5th ed.). Cengage Learning. p. 659. ISBN 978-1-305-94695-8 – via Google Books.
  4. ^ Casad (2008), p. 346
  5. ^ Negus, Christopher (2004-07-02). "About "r" Commands". Red Hat Fedora Linux 2 Bible. Wiley. ISBN 0-7645-5745-9. OCLC 441918216. Retrieved 2018-03-04.
  6. ^ "A Case Study of Using a Secure Network Layer Protocol". CiteSeerX 10.1.1.178.8497.
  7. ^ Nicholas Rosasco; David Larochelle. "How and Why More Secure Technologies Succeed in Legacy Markets: Lessons from the Success of SSH" (Conference Paper). Harvard University. doi:10.1007/1-4020-8090-5_18. S2CID 19035681. Retrieved 13 April 2023.
  8. ^ "REXEC command—Execute a command on the remote host and receive the results on your local host". z/OS Communications Server: IP User's Guide and Commands. 2013 [1990]. Retrieved 2018-03-04.
  9. ^ a b "More on Ports". FreeBSD Network Administrators Guide. Retrieved 2018-03-04.
  10. ^ a b Casad (2008), pp. 350–51
  11. ^ Kantor, Brian (December 1991). BSD Rlogin (Report). Internet Engineering Task Force.
  12. ^ ".rhosts File Format for TCP/IP". www.ibm.com. Retrieved 2023-11-29.
  13. ^ "hosts.equiv File Format for TCP/IP". www.ibm.com. Retrieved 2023-11-29.
  14. ^ Edwards, Wade; Lancaster, Tom; Quinn, Eric; Rohm, Jason; Tow, Bryant (2004). CCSP: Secure PIX and Secure VPN Study Guide. Sybex. p. 154. ISBN 0-7821-4287-7. Retrieved 2018-03-07 – via Google Books.
  15. ^ "rexecd(8)". manpagez.com. Retrieved 2018-03-03.
  16. ^ a b Farrell, Phillip (3 August 2004). "rcp". earthsci.stanford.edu. Stanford University School of Earth, Energy & Environmental Sciences. Archived from the original on 2021-02-07. Retrieved 2018-03-06.
  17. ^ "Rlogin, RSH, and RCP". SourceDaddy. Retrieved 2018-02-18.
  18. ^ "rwho (1) - Linux Man Pages". Retrieved 2018-03-07.
  19. ^ a b "rwhod (8) - Linux Man Pages". Retrieved 2018-03-07.
  20. ^ "ruptime (1) - Linux Man Pages". SysTutorials. Retrieved 2018-03-07.
  21. ^ Sobell, Mark (2010). A Practical Guide to Linux Commands, Editors, and Shell Programming. Pearson Education, Inc. ISBN 978-0-13-136736-4.
  22. ^ "Unix job control command list". Indiana University. Retrieved 20 December 2014.

References

Further reading

Read other articles:

American physician and painter (1770–1822) Lady with Her Pets, 1790, Metropolitan Museum of Art Rufus Hathaway (1770–1822) was an American physician and folk art painter. He lived in southern Massachusetts, where he painted numerous portraits between 1790 and 1795.[1] He later studied medicine and established himself as a doctor at Duxbury.[2] Hathway was born in Freetown, Massachusetts, and was the eldest of six children born to Asa Hathaway and Mary Phillips;[1] ...

 

إيكرو     الإحداثيات 34°21′20″N 89°01′39″W / 34.3556°N 89.0275°W / 34.3556; -89.0275  تقسيم إداري  البلد الولايات المتحدة[1]  التقسيم الأعلى مقاطعة بونتوتوك  خصائص جغرافية  المساحة 12.224503 كيلومتر مربع12.224506 كيلومتر مربع (1 أبريل 2010)  ارتفاع 118 متر  عدد السكان ...

 

Vicente Palacio Vicente Riva Palacio Guerrero (Mexico-Stad, 18 oktober 1832 - Madrid, 22 november 1896) was een Mexicaans schrijver, dichter, militair en politicus. Riva Palacio was de zoon van de liberale politicus en militair Mariano Riva Palacio, die de advocaat was van Keizer Maximiliaan voor diens executie, en was van moederskant kleinzoon van de onafhankelijkheidsstrijder en president Vicente Guerrero. Tijdens de Revolutie van Ayutla en de Hervormingsoorlog stond hij aan de liberale zij...

Constituency of the National Assembly of France You can help expand this article with text translated from the corresponding article in French. (March 2020) Click [show] for important translation instructions. Machine translation, like DeepL or Google Translate, is a useful starting point for translations, but translators must revise errors as necessary and confirm that the translation is accurate, rather than simply copy-pasting machine-translated text into the English Wikipedia. Do not...

 

  2023 Spa-Francorchamps Formula 2 roundRound detailsRound {{{Round_No}}} of 13 in the 2023 FIA Formula 2 Championship.Layout of the Circuit de Spa-FrancorchampsLocationCircuit de Spa-Francorchamps, Stavelot, BelgiumCoursePermanent racing facility 7.004 km (4.352 mi)Sprint RaceDate 29 July 2023Laps 17[a]PodiumFirst Enzo Fittipaldi Rodin CarlinSecond Théo Pourchaire ART Grand PrixThird Dennis Hauger MP MotorsportFastest lapDriver Enzo Fittipaldi Rodin CarlinTime 2:03.608 (on...

 

Ankylosaurus Periode Kapur akhir, 68–66 jtyl PreЄ Є O S D C P T J K Pg N ↓ TaksonomiKerajaanAnimaliaFilumChordataKelasReptiliaOrdoOrnithischiaFamiliAnkylosauridaeGenusAnkylosaurus Brown, 1908 lbs Ankylosaurus adalah salah satu jenis dinosaurus yang hidup pada periode kapur akhir sekitar 68 juta hingga 65 juta tahun yang lalu di Amerika Utara.[1] Memiliki tubuh sepanjang 8 meter ( 26 kaki), tingginya sekitar 2 meter ( 6.6 kaki), dan beratnya mencapai setidaknya 4 ton. An...

Cristiano Biraghi Informações pessoais Nome completo Cristiano Biraghi Data de nascimento 1 de setembro de 1992 (31 anos) Local de nascimento Cernusco sul Naviglio, Itália Nacionalidade italiano Altura 1,84 m Pé canhoto Informações profissionais Clube atual Fiorentina Número 3 Posição Lateral-esquerdo e meia Clubes de juventude 1999–20032003–20112007–2008 AtalantaInternazionale→ Pro Sesto (emp.) Clubes profissionais2 Anos Clubes Jogos e gol(o)s 2010–20162011–201...

 

У Вікіпедії є статті про інші значення цього терміна: Глибоке. село Глибоке Країна  Україна Область Миколаївська область Район Миколаївський район Громада Коблівська сільська громада Основні дані Населення 8 Поштовий індекс 57430 Телефонний код +380 5153 Географічні дані Ге

 

  此條目介紹的是中華民國行政院主計總處於1936年至2005年間所公告的行政區域。关于中華民國成立至今的領土變化,请见「中華民國疆域」。关于中華民國現行有效統治之行政區域,请见「中華民國行政區劃」。     中華民國大陸時期行政區劃單位 省級行政區 省 地區/地方 特別區/特別行政區 特別市(國民政府)/院轄市 其他國家直轄行政區由行...

Penampang lintang batang, empulur adalah titik gelap di tengah Empulur adalah bagian berwarna putih di tengah. Bagian berwarna hijau di luarnya adalah jaringan kayu yang masih muda Dalam anatomi tumbuhan, empulur adalah bagian terdalam dari batang tumbuhan berpembuluh. Istilah dalam bahasa Inggris adalah pith. Empulur biasanya berupa jaringan lunak agak kering, kadang-kadang berongga kecil-kecil. Pada beberapa tumbuhan, seperti rumput-rumputan, empulur memiliki ruang kosong sehingga membentuk...

 

2000 single by New Found GloryHit or MissSingle by New Found Gloryfrom the album Nothing Gold Can Stay and New Found Glory ReleasedJune 17, 2000RecordedElysian Fields Studios, Boca Raton, FloridaGenrePop punk[1]emo[2]Length3:15 (Nothing Gold Can Stay version)3:22 (New Found Glory version)LabelDrive-Thru, MCASongwriter(s) Jordan Pundik Ian Grushka Chad Gilbert Cyrus Bolooki Steve Klein[3] Producer(s)Neal AvronNew Found Glory singles chronology Hit or Miss (2000) Dressed...

 

Indian film actor and acting trainer (born 1966) This article uses bare URLs, which are uninformative and vulnerable to link rot. Please consider converting them to full citations to ensure the article remains verifiable and maintains a consistent citation style. Several templates and tools are available to assist in formatting, such as reFill (documentation) and Citation bot (documentation). (August 2022) (Learn how and when to remove this template message) Samar Jai SinghBorn (1966-09-26) 2...

Gajasimha sculpture, Museum of Cham Sculpture, Danang, Vietnam The gajasimha or gajasiha (from Sanskrit: gaja+siṃha / Pali: gaja+sīha) is a mythical hybrid animal in Hindu mythology, appearing as a sinha or rajasiha (mythical lion) with the head or trunk of an elephant. It is found as a motif in Indian and Sinhalese art,[1] and is used as a heraldic symbol in some Southeast Asian countries, especially Cambodia and Thailand. In Siam (pre-modern Thailand), the gajasimha served as the...

 

مسجد المعمار معلومات عامة القرية أو المدينة جدة التاريخية الدولة  السعودية المواصفات المساحة 1093 هـ تعديل مصدري - تعديل   مسجد المعمار، أحد مساجد جدة التاريخية في المملكة العربية السعودية، يقع المسجد في شارع العلوي غربا بمحلة، وهو الآن بحالة جيدة وتقام فيه الصلاة وله ...

 

2004 Indian filmVellinakshatramDirected byVinayanWritten byVinayanProduced byBabu PanickerStarringPrithviraj SukumaranTaruni SachdevCinematographyShaji KumarEdited byG. MuraliMusic byM. JayachandranDistributed bySwargachitraRelease date 2 April 2004 (2004-04-02) Running time156 minutesCountryIndiaLanguageMalayalam Vellinakshatram (transl. Silver Star) is a 2004 Malayalam-language comedy horror film by Vinayan starring Prithviraj Sukumaran and Taruni Sachdev with Meenakshi...

Malabon's at-large congressional districtConstituencyfor the House of Representatives of the PhilippinesMap of Metro Manila showing the location of Malabon.CityMalabonRegionMetro ManilaPopulation380,522 (2020)[1]Electorate258,115 (2022)[2]Major settlementsMalabonArea15.71 km2 (6.07 sq mi)Current constituencyCreated2007RepresentativeJosephine Lacson-NoelPolitical party  NPCCongressional blocMajority Malabon's at-large congressional district is the congressio...

 

リー・バクスター 名前ラテン文字 Lee BAXTER基本情報国籍 イングランド スウェーデン生年月日 (1976-06-17) 1976年6月17日(47歳)出身地 ヘルシンボリ身長 187cm選手情報ポジション GKユース1990-1992 ブラックバーン・ローヴァーズFC1992 BKアストリオ(英語版)クラブ1年 クラブ 出場 (得点)1992-1993 サンフレッチェ広島 0 (0)1995-1997 ヴィッセル神戸 0 (0)1998 レンジャーズFC 0 (0)1998-2...

 

Austronesian language spoken in the Philippines This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed.Find sources: Pangasinan language – news · newspapers · books · scholar · JSTOR (October 2011) (Learn how and when to remove this template message) PangasinanPangasinenseSalitan PangasinanPronunciation[paŋɡasiˈnan]&#...

Date palm cultivar You can help expand this article with text translated from the corresponding article in Arabic. (April 2022) Click [show] for important translation instructions. View a machine-translated version of the Arabic article. Machine translation, like DeepL or Google Translate, is a useful starting point for translations, but translators must revise errors as necessary and confirm that the translation is accurate, rather than simply copy-pasting machine-translated text into t...

 

Makhan Shah Labanaਮੱਖਣ ਸ਼ਾਹ ਲਬਾਣਾDepiction of Makhan Shah Lubana (top left on a rooftop) and Guru Tegh Bahadur (bottom left) from a gilded panel from the Golden Temple doors later donated by Maharaja Ranjit SinghPersonalBorn7 July 1619 (23 Ashad 1676 Bikarmi)Tanda, Jhelum District[1]Died1674Village Raja Harpal, SialkotReligionSikhismSpouseBibi Sital Devi (Suljai)ChildrenLal ChandJawanda ShahKushal ChandChandu LalParent(s)Bhai Dasa (father)Vijay Devi (mother)K...

 

Strategi Solo vs Squad di Free Fire: Cara Menang Mudah!