Home PC Games Linux Windows Database Network Programming Server Mobile  
           
  Home \ Server \ CentOS6 installation configuration rsh     - Linux Creating a new user error Creating mailbox file: File exists (Linux)

- Android annotation support (Support Annotations) (Programming)

- Java thread lifecycle (Programming)

- Linux system security knowledge (Linux)

- How to set IonCube Loaders in Ubuntu (Linux)

- SSH without password (Linux)

- CentOS of NFS (Server)

- The SVN installation, configuration and start - up under Linux (CentOS 6.5) (Server)

- Forgot Linux root password (Linux)

- Talk about Java in the collection (Programming)

- Neo4j map data processing tab (Database)

- Iptables application layer plug (Linux)

- CentOS 6.x and CentOS7 installation RPMforge (Linux)

- Batch download files using the explorer under Windows Server 2008 R2 (Server)

- Linux kernel modules related to the management Comments (Linux)

- Large site architecture study notes (Server)

- To install Python-Pip and Fabric under CentOS / Ubuntu (Linux)

- Oracle set the timer task JOB scheduler to execute stored procedures or PL / SQL code block (Database)

- Linux Security Module (LSM) Introduction (Linux)

- httpd-2.4 feature (Server)

 
         
  CentOS6 installation configuration rsh
     
  Add Date : 2018-11-21      
         
         
         
 

CentOS6 installation configuration rsh

General Information:
a node:
ip: 192.168.8.166
hostname: hadrtest01
two nodes:
ip: 192.168.8.250
hostname: hadrtest02

1, two nodes were installed rsh, whether rsh-server package is already installed

yum -y install rsh rsh-server

2, modify /etc/xinetd.d/rlogin ensure disable = no line

# default: on
# description: rlogind is the server for the rlogin (1) program The server
# provides a remote login facility with authentication based on
# privileged. . port numbers from trusted hosts
service login
{
  socket_type = stream
  wait = no
  user = root
  log_on_success + = USERID
  log_on_failure + = USERID
  server = /usr/sbin/in.rlogind
  disable = no
}

The same two nodes modify

3, modify /etc/xinetd.d/rsh ensure disable = no line

[root @ hadrtest01 ~] # cat /etc/xinetd.d/rsh
# default: on
# description: The rshd server is the server for the rcmd (3) routine and,
# consequently, for the rsh (1) program. The server provides
# remote execution facilities with authentication based on
# privileged port numbers from trusted hosts.
service shell
{
  socket_type = stream
  wait = no
  user = root
  log_on_success + = USERID
  log_on_failure + = USERID
  server = /usr/sbin/in.rshd
  disable = no
}

The same two nodes modify

4, edit / etc / securetty, add rexec, rsh, rlogin three lines

echo "

rexec

rsh

rlogin

"> > / etc / securetty


5, edit the / etc / hosts, add two nodes ip, host name

[root @ hadrtest01 ~] # cat / etc / hosts

127.0.0.1 localhost localhost.localdomain localhost4 localhost4.localdomain4

:: 1 localhost localhost.localdomain localhost6 localhost6.localdomain6

192.168.8.166 hadrtest01

192.168.8.250 hadrtest02


two nodes also modify

6, modify ~ / .rhosts, add a node, two nodes host name, ip

[root @ hadrtest01 ~] # cat ~ / .rhosts

hadrtest01 root

hadrtest02 root

[root @ hadrtest02 ~] # cat ~ / .rhosts

hadrtest01 root

hadrtest02 root

7, respectively, to start the service two nodes
reboot:

service xinetd restart

boot:

chkconfig xinetd on

8, a test
node:

[root @ hadrtest01 ~] # rsh hadrtest02

Last login: Tue Feb 16 17:44:56 from hadrtest01

[root @ hadrtest02 ~] #


do not enter a password to log on two nodes indicates the installation was successful

two nodes:

[root @ hadrtest02 ~] # rsh hadrtest01

Last login: Tue Feb 16 17:39:35 from hadrtest02

[root @ hadrtest01 ~] #

without entering a password to log node represents a successful installation

     
         
         
         
  More:      
 
- Four levels to deal with Linux server attacks (Linux)
- User rights management system under Linux (Linux)
- Linux system crash (no such file or directory) How to rescue database (Linux)
- pureftpd basis: Install, configure, implement, anonymous logon (Linux)
- Linux operating system must know the security command (Linux)
- fcntl file locking function add (Programming)
- Ubuntu uses conky add desktop control (Linux)
- Modifying the system registry protection server security (Linux)
- CentOS7 installation performance monitoring system (Server)
- CentOS Nginx achieve 3 virtual machine load balancing (Server)
- Linux security settings Notes (Linux)
- GNU / Linux enable Intel Rapid Start (Linux)
- Linux system security Comments (Linux)
- CoreOS Linux introduces Kubernetes kubelet (Server)
- To install the latest version of Shotwell 0.18 under Ubuntu (Linux)
- Docker container plaintext password problem-solving way (Server)
- SYN attack hacker attack and defense of the basic principles and prevention technology (Linux)
- 10 important Linux ps command combat (Linux)
- RPM package management tools under Linux (Linux)
- Linux System Getting Started Tutorial: Using the Linux common commands (Linux)
     
           
     
  CopyRight 2002-2020 newfreesoft.com, All Rights Reserved.