The value of rsh.access controls access to the node, and is set by options rsh.access. See na_protocolaccess(8) for more details. This value is checked prior to the authentication mechanisms discussed below.
The /etc/hosts.equiv file controls authentication to the node remote shell. The hosts and users (on those hosts) listed in the /etc/hosts.equiv file are automatically authenticated. This means that the node accepts remote shell commands via rsh from these hosts and users.
An alternative authentication mechanism for rshd is to have the client use rsh with a -l option that specifies the admin_name and password in the form of -l admin_name:password. Both the admin_name and password are created with the node's useradmin command.
adminhost% rsh -l root toaster version
The following example shows how to run the sysconfig -r command with a password rpass42 from an untrusted host named ahost through a remote shell:
ahost% rsh -l root:rpass42 toaster sysconfig -r
To see a list of node commands that can be executed, enter:
adminhost% rsh -l root toaster "?"