HPlogo Installing and Administering Internet Services: HP 9000 Networking > Chapter 10  Using rdist

Starting rdist

» 

Technical documentation

Complete book in PDF

 » Table of Contents

 » Index

After creating the distfile on the master host, you can start rdist from the command line or from a cron file. rdist must be run as root on the master host. There are two forms of the rdist command syntax. One form is the following:

/usr/bin/rdist [-b] [-h] [-i] [-n] [-q] [-R] [-v] [-w]
[-y] [-d var=value] [-f distfile] [-m host] ... [label]

-d var=value sets the value of the variable var to value. value can be an empty string, one name, or a list of names separated by tabs and/or spaces and enclosed by a pair of parentheses. The -d option is used to define variable definitions in the distfile. However, if you specify the -d option for a variable that is already defined in the distfile, the -d option has no effect (because the distfile overrides the -d option).

-f distfile specifies distfile as the distfile to be used to update files and directories. If the distfile is not specified, rdist looks in the current working directory for the file distfile, then the file Distfile.

-m host limits the updates to host, which is one of the hosts previously identified in the distfile. Multiple -m arguments may be specified.

label performs only the command entries specified by label in the distfile.

Other options are listed in Table 10-2 “rdist Command Line Options”.

The other form of the rdist command syntax is:

/usr/bin/rdist [-b] [-h] [-i] [-n] [-q] [-R] [-v] [-w]
[-y] -c pathname ... [login@]host[:destpath]

-c pathname ... [login@]host[:destpath] updates file(s) in pathname on the remote host host. (The -c arguments are interpreted as a distfile.) login specifies the user name used to perform the update. destpath specifies the path name of the installed file on the remote host.

Other options are listed in Table 10-2 “rdist Command Line Options”.

Table 10-2 rdist Command Line Options

-b

Performs a binary comparison and updates files if they differ. Without this option, rdist updates files only if the size or modification time differs.

-h

Follows symbolic links on the master host and copies the file(s) that the link points to. Without this option, rdist copies the name of a symbolic link.

-i

Ignores unresolved links. Without this option, rdist tries to maintain the link structure of the files being copied and sends out warnings if any link cannot be found.

-M

Checks that mode, ownership, and group of updated files on the remote host are the same as the master copy and updates the files if they differ. This is done in addition to any other comparison that may be in effect.

-n

Prints rdist commands on standard output on the master host without executing them. This option is useful for debugging a distfile.

-q

Suppresses printing of files being modified to standard output on the master host.

-R

Removes files in the remote host's directory that do not exist on the master directory.

-v

Displays the files that are out of date on the remote host but does not update any files or send any mail.

-w

Appends the full path name (including directory subtree) to a destination directory name.

-y

Does not update files on the remote host that are newer than the master copy.

 

Example Output on the Master Host

This section shows an example of what is displayed on the standard output on the master host when rdist is run. An example distfile is shown below:

HOSTS = (lassie benji )

FILES = ( myprog.c )
${FILES} -> ${HOSTS}
install;
special "cc";
notify bentley@tbear;

rdist is started with no command line options. The display on the standard output on the master host is shown below:

% /usr/bin/rdist
updating host lassie
installing: myprog.c
special "cc"
notify @lassie (bentley@tbear)
updating host benji
installing: myprog.c
special "cc"
notify @benji (bentley@tbear)

Authentication for remsh and rexec Sercvices

Pluggable Authenticaion Modules (PAM) for authentication is supported on HP-UX. PAM support enables users who are not listed in /etc/passwd file to use the rexecd and remshd service. It also enbles you to use authentication methods other than the standard UNIX authentication. DCE integrated login and Kerberos are authentication mechanisms you can use in addition to standard UNIX authentication.

The rexecd and remshd services will use the authentication mechanism specified in "OTHER" directive of the /etc/pam.conf file. To use other authentication methods, you must edit the /etc/pam.conf file.

The Pluggable Authentication Module Configuration File

The /etc/pam.conf file is the configuration file for the Pluggable Authentication Module architecture (PAM). The pam.conf file contains a list of services. Each service is paired with a corresponding service module. When a service is requested, its associated module is invoked. Each entry in the /etc/pam.conf file has the following format:

Service_name module_type control_flag module_path options. 

Refer to the pam.conf manpage for a detailed description of each of the fields mentioned above.

Enabling Standard UNIX Authentication on rexecd and remshd Services

To use the rexec and remsh services enabled with PAM, add the following lines to the /etc/pam.conf file:

rcomds      auth required      /usr/lib/security/libpam_unix.1
rcomds account required /usr/lib/security/libpam_unix.1

The remshd and rexecd services will use the above entries as configuration information for authenticating users. Adding the lines above tell rexec and remsh to use the UNIX authentication mechanism to authenticate the users.

For every service (like rexec and remsh), it is possible to have more than one entry in the /etc/pam.conf file for each of the module types available. The module types supported include:

  • authentication (auth)

  • account management (account)

  • session management (session)

  • password management (passwd)

Enabling DCE Integrated Logging Authentication

To enable DCE integrated logging authentication mechanism, add the following line to the /etc/pam.conf file:

 rcomds      auth required       /usr/lib/security/libpam_dce.1

Using remshd enabled with PAM in Secure Internet Services Environment

The rexec service is not kerberised and will not work in the SIS environment. However, the remshd service is kerberised. To use the PAM modules in the SIS environment, add the following line to the /etc/pam.conf file.

rcomds      auth required       /usr/lib/security/libpam_dce.1

Also in the Kerberos environment, remshd has command line options for combining UNIX method and Kerberos method of authentication. A combination of both Kerberos and UNIX authentication is available. These command line options can be set in the /etc/inetd.conf for the "kremshd" service. Refer to the kremshd(1m) manpage for a more detailed description of the options available.

© 2000 Hewlett-Packard Development Company, L.P.