Why use rlogin




















The rlogin command enables you to log in to other UNIX machines on your network. If a password prompt appears, type the password for the remote machine and press Return.

When you log in to a machine where you have no account, rlogin displays a message stating that you have no home directory on the remote machine. The -l option of the rlogin command enables to log in to a remote machine as someone else. This option can be useful if you are working on someone else's machine using their username and you want to log in to your own machine as yourself.

If you were asked for your password--and don't want to be asked again--edit the file. Add a line to. This line states that user johnsonm from goophy. Be careful to avoid two posible security problems when using. First, be certain that the remote machine is secure. Instead, the traffic is encrypted to prevent snoopers from knowing what is being transmitted or received.

SSH also uses public-key cryptography to authenticate that the connecting user is who he says he is. Rlogin does not do this, making it possible for someone to impersonate a valid user and access his account in the remote computer. SSH also has another feature that you would not find in Rlogin, the ability to connect and automatically pass a single command to the remote computer.

The main use of this feature is in automating certain activities so that you can create a single script and you no longer have to input commands yourself. You can then execute this script yourself whenever you want to or you can also have it executed by other means even when you are not in front of the remote computer.

The security flaws in rlogin mean that it is not advisable to use if the server, the client, or the connection is located in any public network. Even if you are in your own private network that cannot be accessed by anyone else, there is nothing to lose by using SSH.

It was called password sniffing , and it was very common in the mid s. Thus, in practice passwords sent using it were vulnerable. Furthermore, rlogin supports. These files rely on IP addresses for authentication, and spoofing IP addresses is fairly easy. For example, any attacker on the local network can pretend to be any other host. In the past, these attacks could also be performed remotely due to predictable TCP sequence numbers.



0コメント

  • 1000 / 1000