|Internet||IP ( IPv4 , IPv6 )|
The Remote Shell (RSH) program is a Unix program that enables commands and programs to be executed on a remote computer . The outputs of the program running on the remote computer are forwarded to the local computer. The RSH program is used to maintain other computers in the network or to run programs on them without the user having to be logged on directly to the remote computer.
RSH is one of the so-called Berkeley remote utilities for remote access to computers with Unix operating systems and was originally developed at the University of Berkeley . It usually uses the standardized TCP port 514 and was part of the first BSD Unix distribution released in 1977 .
Whether another computer is authorized to access a computer via RSH is only checked via the IP address , the source port and the user ID. Since this information is easy to falsify, this type of remote maintenance is very insecure. As an alternative, you should use the more secure SSH .
More modern variants of rsh, e.g. B. the variant of Opensolaris , additionally support the authentication via Kerberos and the encryption of the transmitted data. For newer implementations of the RSH command there is also the option of performing Kerberos authentication.
- rexec (Remote Process Execution) offers the same functionality, whereby the user name and password are read in unencrypted from the socket.
- Telnet , Remote login , Secure Shell (ssh)
- ↑ Joe Casad: Sams Teach Yourself TCP / IP in 24 hours , Fourth Edition, Sams, 2008, ISBN 0-672-32996-4 , online excerpt
- ↑ Terry W Ogletree and Mark Edward Soper: Upgrading and Repairing Networks , 5th Edition, Que 2006, ISBN 0-7897-3530-X , online excerpt