HPlogo Installing and Administering Internet Services: HP 9000 Networking > Chapter 10  Using rdist

Setting Up remsh

» 

Technical documentation

Complete book in PDF

 » Table of Contents

 » Index

rdist uses remsh as the mechanism for distributing files over the network. In order to use rdist, you must set up remsh on each of the remote hosts. Follow these steps:

  1. On each of the remote hosts, create an entry for the master host in the $HOME/.rhosts file of the user who will run rdist. For example, if rdist will always be run by user root, create an entry for the master host in root's .rhosts file (/.rhosts) on each of the remote hosts.

  2. On each of the remote hosts, make sure following line is uncommented in the /etc/inetd.conf file. (Make sure it is not preceded by #.)

    shell stream tcp nowait root /usr/lbin/remshd remshd

  3. On each of the remote hosts, issue the following command to force inetd to reread its configuration file:

    /usr/sbin/inetd -c

Authentication for remsh and rexec Services

Pluggable Authenticaion Modules (PAM) for authentication is supported on HP-UX. PAM support enables users who are not listed in /etc/passwd file to use the rexec and remsh services. It also enbles you to use authentication methods other than the standard UNIX authentication. DCE integrated login and Kerberos are authentication mechanisms you can use in addition to standard UNIX authentication.

The rexecd and remshd services will use the authentication mechanism specified in "OTHER" directive of the /etc/pam.conf file. To use other authentication methods, you must edit the /etc/pam.conf file.

The Pluggable Authentication Module Configuration File

The /etc/pam.conf file is the configuration file for the Pluggable Authentication Module architecture (PAM). The pam.conf file contains a list of services. Each service is paired with a corresponding service module. When a service is requested, its associated module is invoked. Each entry in the /etc/pam.conf file has the following format:

Service_name module_type control_flag module_path options. 

Here are a few examples of entries you may find in a PAM configuration file:

dtlogin   auth    required    /usr/lib/security/libpam_unix.1 debug
dtlogin account required /usr/lib/security/libpam_unix.1
OTHER auth optional /usr/lib/security/libpam_unix.1

The service_name refers to the service. In the examples above, dtlogin and the keyword, OTHER, indicates the module all other applications that have not been specified should use.

The module_type indicates the service module type. The possible module types include:

  • authentication (auth)

  • account management (account)

  • session management (session)

  • password management (passwd)

The control_flag field determines the behavior of stacking. See the pam.conf man page for a complete discussion of stacking.

The module_path field specifies the pathname to a shared library object that implements the service functionality.The options field is used by the PAM framework layer to pass module specific options to the modules. The module parses and interprets the options. The modules can use this field to turn on debugging or to pass any module specific parameters such as a TIMEOUT value. It can also be used to support unified login.

Enabling Standard UNIX Authentication on rexecd and remshd Services

To use the rexec and remsh services enabled with PAM, add the following lines to the /etc/pam.conf file:

rcomds      auth required      /usr/lib/security/libpam_unix.1
rcomds account required /usr/lib/security/libpam_unix.1

The remshd and rexecd services will use the above entries as configuration information for authenticating users. Adding the lines above tells rexec and remsh to use the UNIX authentication mechanism to authenticate the users.

For every service (like rexec and remsh), it is possible to have more than one entry in the /etc/pam.conf file for each of the module types available. Refer to the pam.conf manpage for more information.

Enabling DCE Integrated Logging Authentication

To enable DCE integrated logging authentication mechanism, add the following line to the /etc/pam.conf file:

 rcomds      auth required       /usr/lib/security/libpam_dce.1

Using remshd in a Secure Internet Services Environment

The rexec service will not work in the Secure Internet Services (SIS) environment. However, the remsh service works in the SIS environment. To use the remsh enabled with PAM in the SIS environment, add the following line to the /etc/pam.conf file.

rcomds      auth required       /usr/lib/security/libpam_dce.1

Also in the Kerberos environment, remsh has command line options for combining UNIX method and Kerberos method of authentication. A combination of both Kerberos and UNIX authentication is available. These command line options can be set in the /etc/inetd.conf for the "kremshd" service. See the kremshd man page for details.

© 2000 Hewlett-Packard Development Company, L.P.