[ Previous | Next | Contents | Glossary | Home | Search ]
AIX Version 4.3 System User's Guide: Communications and Networks

Communicating with Other Systems and Users

There are several methods of communicating with other systems and users. Two methods are discussed here. The first method is by connecting a local host to a remote host. This allows you to access a personal file from someone else's workstation; you can also have your system administrator reassign permissions to a sensitive file you have been working on, and you can even connect to your own computer from someone else's computer station. The second method is by conversing with a remote user. This allows you to have an interactive electronic conversation with a user on a remote host.

Connecting a Local Host to a Remote Host

There are several reasons why you might need to access a computer other than your own. For example, your system administrator might need to reassign permissions to a sensitive file you have been working on, or you might need to access a personal file from someone else's workstation. Remote login functions, such as the rlogin, rexec, and telnet commands, enable the local host to perform as an input/output terminal host. Key strokes are sent to the remote host and the results are displayed on the local monitor. When you end the remote login session, all functions return to your local host.

Transmission Control Protocol/Internet Protocol (TCP/IP) contains the following commands for remote login and command execution:

rexec The rexec command makes it possible to execute commands interactively on different foreign hosts when you log in to a remote host with the rlogin command. This command is disabled by the system manager if extra security is needed for your network. Upon issuing the rexec command, your local host searches the $HOME/.netrc file of the remote host for your user name and a password from your local host. If these are found, the command you requested to be run on the local host will then be run. Otherwise, you will be required to supply a login name and password before the request can be honored.
rlogin The rlogin command makes it possible to log in to similar foreign hosts. Unlike telnet, which can be used with different remote hosts, the rlogin command can be used on UNIX hosts only. This command is disabled by the system manager if extra security is needed for your network.

The rlogin command is similar to the telnet command in that both allow a local host to connect to a remote host. The only difference is that the rlogin command is considered a nontrusted command and can be disabled if your system needs extra security.

The rlogin command is not a trusted command because the $HOME/.rhosts file, which is owned by the local user, and the /etc/hosts.equiv file, which is owned by your system manager, each keep a listing of remote hosts that have access to the local host. Therefore, if you leave your terminal on while unattended, an unauthorized user could examine the names contained in these files, or worse, could damage a remote host in some way.

If neither the $HOME/.rhosts file nor the /etc/hosts.equiv file contains the name of a remote host that is trying to log in, the local host prompts for a password. The remote password file is first checked to verify the password entered; the login prompt is again displayed if the password is not correct. Pressing ~. (tilde, period) at the login prompt ends the remote login attempt.

The rlogin command can also be configured to use Kerberos V.5 to authenticate the user. This option allows the user to be identified without the use of a $HOME/.rhosts file or passing the password across the network. For more information about this use of the rlogin command, see Understanding the Secure Rcmds.

rsh and remsh The rsh and remsh commands make it possible to execute commands on similar foreign hosts. All required input must be performed by the remote host. The rsh and remsh commands are disabled by the system manager if extra security is needed for your network.

The rsh command can be used in two ways:

  • To execute a single command on a remote host when a command name is specified.
  • To execute the rlogin command when no command name is specified.

When the rsh command is issued, your local host searches the /etc/hosts.equiv file on the remote host for permission to log in. If that is unsuccessful, the $HOME/.rhosts file is searched. Both of these files are lists of remote hosts having login permission. Remote users should be required to enter a password after issuing the rsh command.

It is also possible to eliminate the need to issue the rlogin command. The rsh command permits the execution of commands on a remote host, but does not provide a means of bypassing the password requirement. If a password is needed to access a remote host, then a password is needed to use the rsh command as well because both commands access the $HOME/.rhosts and /etc/hosts.equiv files.

The rsh command can also be configured to use Kerberos V.5 to authenticate the user. This option allows the user to be identified without either the use of a $HOME/.rhosts file or passing the password across the network. For more information about this use of the rsh command, see Understanding the Secure Rcmds.

telnet, tn, and tn3270 The telnet command is a terminal emulation program that implements the TELNET protocol and allows you to log in on a similar or dissimilar foreign host.
Note: For convenience, telnet hereafter refers to the telnet, tn, and tn3270 commands.

The telnet command is one way a user can log in to a remote host. The most important feature of the telnet command is that it is a trusted command. A trusted command is one that meets all security levels configured into your computer. In contrast, the rlogin command, which also allows for remote login, is not considered a trusted command. Systems that require extra security should not execute the rlogin command. The standards for trusted commands, processes, and programs are set and maintained by the US Department of Defense.

A system may need extra security to prevent unauthorized users from gaining access to its files, stealing sensitive data, deleting files, or placing viruses or worms on the system. The security features of TCP/IP are designed to help prevent these occurrences.

A user who wishes to log in to a remote host with the telnet command must provide the user name and password of an approved user for that computer. This is similar to the procedure used for logging in to a local host. Once successfully logged in to a remote host, the user's terminal runs as if directly connected to the host.

The telnet command implements the TELNET Protocol, which allows remote login to other hosts. It uses TCP/IP to communicate with other hosts in the network. The tn command performs the same function as the telnet command.

The telnet command supports an option called terminal negotiation. If the remote host supports terminal negotiation, the telnet command sends the local terminal type to the remote host. If the remote host does not accept the local terminal type, the telnet command attempts to emulate a 3270 terminal and a DEC VT100 terminal. If you specify a terminal to emulate, the telnet command does not negotiate for terminal type. If the local and remote hosts cannot agree on a terminal type, the local host defaults to none.

The telnet command supports these 3270 terminal types: 3277-1, 3278-1, 3278-2, 3278-3, 3278-4, and 3278-5. If you are using the telnet command in 3270 mode on a color display, the colors and fields are displayed just as those on a 3279 display, by default. You can select other colors by editing one of the keyboard mapping files in the preceding list of terminal types. Once the telnet session has ended, the display is reset to the colors in use before the session began.

The telnet command can also be configured to use Kerberos V.5 to authenticate the user. This option allows the user to be identified without either the use of a $HOME/.rhosts file or passing the password across the network. For more infomation about this use of the telnet command, see Understanding the Secure Rcmds.

Note: The rsh and rexec commands can be used to execute commands on a remote host. Both are considered to be nontrusted commands and may not meet all security levels configured into your computer. As a result, these commands may be disabled if your system requires extra security.

Prerequisites

You must have a valid user ID and password for the remote host.

To Log in to a Remote Host

  1. To log in to a remote host (host1 in this example) and do terminal negotiation, enter:
    telnet host1
    Information similar to the following is displayed on your screen:
    Trying . . .
    Connected to host1
    Escape character is '^T'.
     
    AIX telnet (host1)
     
    AIX Operating System
    Version 4.1
    (/dev/pts0)
    login:_
  2. If you cannot log in, you can cancel the connection by pressing the Ctrl-T key sequence.

    Once you have logged in, you can issue commands. To log out of the system and close the connection, press the Ctrl-D key sequence.

Conversing with a Remote User

You can use the talk command to have a real-time conversation with another user on a remote host. The talk command requires a valid address to which to bind. The host name of the remote machine must be bound to a working network interface, which is usable by other network commands, such as the ping command. If a machine has no network interface, that is a standalone machine, it must bind its host name to the loopback address (127.0.0.1) in order for the talk command to work.

Using electronic mail, you can send text messages to other users on a local network and receive mail from them as well. If a computer system is configured appropriately and you know the appropriate electronic address, you can send electronic mail messages across the country (or world) to someone on a remote system.

TCP/IP contains the following commands for remote communications:

mail Sends and receives electronic memos and letters.
talk Allows you to have an interactive conversation with a user on a remote host.

Prerequisites

  1. The talkd daemon must be active on both the local and remote host.
  2. The user on the remote host must be logged in.

To Converse with a Remote User

  1. To talk to a user logged in on a remote host, enter:
    talk dale@host2
    In this example jane@host1 is trying to converse with dale@host2 .

  2. When a remote user wishes to start a conversation with you, a message similar to the following appears:
    Message from TalkDaemon@host1 at 15:1
    6...
    talk: connection requested by jane@host1.
    talk: respond with: talk jane@host1
    dale@host2 receives this message informing her that jane@host1 is trying to converse with her.

  3. To accept the invitation, enter:
    talk jane@host1
    dale@host2 and jane@host1 are now able to have an interactive conversation.

  4. To end a conversation at any time, press the Ctrl-C key sequence. This returns the command line prompt.

Related Information

TCP/IP Facilities, Terminology, and Application.

TCP/IP Security.

The talk command.

The talkd daemon.

The .rhosts file format, hosts.equiv file format, .netrc file format.

The rsh command, rexec command, rlogin command, telnet command.

The telnetd daemon.


[ Previous | Next | Contents | Glossary | Home | Search ]