remsh.1 (2010 09)

r
remsh(1) remsh(1)
remsh otherhost -n "command 1>&- 2>&- &"
(See remshd(1M) and sh(1)). If your login shell on the remote system is csh, use the following form
instead:
remsh otherhost -n "sh -c \"command 1>&- 2>&- &\""
RETURN VALUE
If remsh fails to set up the secondary socket connection, it returns 2. If it fails in some other way, it
returns 1. If it fully succeeds in setting up a connection with
remshd, it returns 0 once the remote com-
mand has completed. Note that the return value of
remsh bears no relation to the return value of the
remote command.
DIAGNOSTICS
Besides the errors listed below, errors can also be generated by the library functions
rcmd() and
rresvport(). In the case of IPv6 systems, the library functions
rcmd() and rresvport() are
replaced by
rcmd_af() and rresvport_af()
; respectively, and can generate errors (see rcmd(3N)
and rcmd_af (3N)). These errors are preceded by the name of the library function that generated them.
remsh can produce the following diagnostic messages:
Error! could not retrieve authentication type.
Please notify sys admin.
There are two authentication mechanisms used by
remsh. One authentication mechanism is
based on Kerberos and the other is not. The type of authentication mechanism is obtained
from a system file which is updated by
inetsvcs_sec (see inetsvcs_sec (1M)). If the system
file does not contain known authentication types, the above error is displayed.
rlogin: ...
Error in executing rlogin (rlogin is executed when the user does not specify any com-
mands to be executed). This is followed by the error message specifying why the execution
failed.
shell/tcp: Unknown service
The ‘‘shell’’ service specification is not present in the /etc/services
file.
Can’t establish stderr
remsh cannot establish secondary socket connection for stderr.
<system call>
: ...
Error in executing system call. Appended to this error is a message specifying the cause of the
failure.
There is no entry for you (user ID uid) in /etc/passwd
Check with the system administrator to see if your entry in the password file has been deleted
by mistake.
Kerberos-specific errors are listed in sis(5).
WARNINGS
For security reasons, the /etc/hosts.equiv and .rhosts files should exist, even if empty, and they
should be readable and writable only by the owner. Note also that all information, including any pass-
words asked for, is passed unencrypted between the two hosts.
If
remsh is run with an interactive command, it hangs.
DEPENDENCIES
remsh is the same service as rsh on BSD systems. The name was changed due to a conflict with the
existing System V command rsh (restricted shell).
AUTHOR
remsh was developed by the University of California, Berkeley.
FILES
/usr/hosts/* for version of the command invoked only with hostname
SEE ALSO
rlogin(1), remshd(1M), rexecd(1M), inetsvcs_sec(1M), gethostent(3N), rcmd(3N), rcmd_af(3N), rexec(3N),
hosts(4), hosts.equiv(4), krb5.conf(4).
HP-UX 11i Version 3: September 2010 3 Hewlett-Packard Company 3