1rpc.rexd(1M) System Administration Commands rpc.rexd(1M)
2
3
4
6 rpc.rexd, rexd - RPC-based remote execution server
7
9 /usr/sbin/rpc.rexd [-s]
10
11
13 rpc.rexd is the Sun RPC server for remote program execution. This dae‐
14 mon is started by inetd(1M) whenever a remote execution request is
15 made.
16
17
18 For non-interactive programs, the standard file descriptors are con‐
19 nected directly to TCP connections. Interactive programs involve
20 pseudo-terminals, in a fashion that is similar to the login sessions
21 provided by rlogin(1). This daemon may use NFS to mount file systems
22 specified in the remote execution request.
23
24
25 There is a 10240 byte limit for arguments to be encoded and passed from
26 the sending to the receiving system.
27
29 The following option is supported:
30
31 -s Secure. When specified, requests must have valid DES credentials.
32 If the request does not have a DES credential it is rejected. The
33 default publickey credential is rejected. Only newer on(1) com‐
34 mands send DES credentials.
35
36 If access is denied with an authentication error, you may have to
37 set your publickey with the chkey(1) command.
38
39 Specifying the -s option without presenting secure credentials
40 will result in an error message: Unix too weak auth (DesONly)!
41
42
44 rpc.rexd uses pam(3PAM) for account and session management. The PAM
45 configuration policy, listed through /etc/pam.conf, specifies the mod‐
46 ules to be used for rpc.rexd. Here is a partial pam.conf file with
47 rpc.rexd entries for account and session management using the UNIX mod‐
48 ule.
49
50 rpc.rexd account requisite pam_roles.so.1
51 rpc.rexd account required pam_projects.so.1
52 rpc.rexd account required pam_unix_account.so.1
53
54 rpc.rexd session required pam_unix_session.so.1
55
56
57
58 If there are no entries for the rpc.rexd service, the entries for the
59 "other" service will be used. rpc.rexd uses the getpwuid() call to
60 determine whether the given user is a legal user.
61
63 /dev/ptsn Pseudo-terminals used for interactive mode
64
65
66 /etc/passwd Authorized users
67
68
69 /tmp_rex/rexd?????? Temporary mount points for remote file systems
70
71
73 See attributes(5) for descriptions of the following attributes:
74
75
76
77
78 ┌─────────────────────────────┬─────────────────────────────┐
79 │ ATTRIBUTE TYPE │ ATTRIBUTE VALUE │
80 ├─────────────────────────────┼─────────────────────────────┤
81 │Availability │SUNWnisu │
82 └─────────────────────────────┴─────────────────────────────┘
83
85 chkey(1), on(1), rlogin(1), svcs(1), inetadm(1M), inetd(1M),
86 svcadm(1M), pam(3PAM), pam.conf(4), publickey(4), attributes(5),
87 pam_authtok_check(5), pam_authtok_get(5), pam_authtok_store(5),
88 pam_dhkeys(5), pam_passwd_auth(5), pam_unix_account(5),
89 pam_unix_auth(5), pam_unix_session(5), smf(5)
90
92 Diagnostic messages are normally printed on the console, and returned
93 to the requestor.
94
96 Root cannot execute commands using rexd client programs such as on(1).
97
98
99 The pam_unix(5) module is no longer supported. Similar functionality is
100 provided by pam_authtok_check(5), pam_authtok_get(5), pam_auth‐
101 tok_store(5), pam_dhkeys(5), pam_passwd_auth(5), pam_unix_account(5),
102 pam_unix_auth(5), and pam_unix_session(5).
103
104
105 The rpc.rexd service is managed by the service management facility,
106 smf(5), under the service identifier:
107
108 svc:/network/rpc/rex:default
109
110
111
112
113 Administrative actions on this service, such as enabling, disabling, or
114 requesting restart, can be performed using svcadm(1M). Responsibility
115 for initiating and restarting this service is delegated to inetd(1M).
116 Use inetadm(1M) to make configuration changes and to view configuration
117 information for this service. The service's status can be queried using
118 the svcs(1) command.
119
120
121
122SunOS 5.11 5 Nov 2004 rpc.rexd(1M)