1Net::SSH::Perl::Auth::RUhsoesrtsC(o3n)tributed Perl DocuNmeetn:t:aStSiHo:n:Perl::Auth::Rhosts(3)
2
3
4

NAME

6       Net::SSH::Perl::Auth::Rhosts - Perform Rhosts authentication
7

SYNOPSIS

9           use Net::SSH::Perl::Auth;
10           my $auth = Net::SSH::Perl::Auth->new('Rhosts', $ssh);
11           print "Valid auth" if $auth->authenticate;
12

DESCRIPTION

14       Net::SSH::Perl::Auth::Rhosts performs Rhosts authentication with a
15       remote sshd server. When you create a new Rhosts auth object, you give
16       it an $ssh object, which should contain an open connection to an ssh
17       daemon, as well as any data that the authentication module needs to
18       proceed. In this case, the $ssh object must contain the name of the
19       user trying to open the connection.
20
21       Rhosts authentication is fairly simple from a protocol point of view.
22       However, note that the sshd server will require your client to be
23       running on a privileged port (below 1024); this will, in turn, likely
24       require your client to be running as root. If your client is not
25       running on a privileged port, the Rhosts authentication request will be
26       denied.
27
28       If you're running as root, Net::SSH::Perl should automatically detect
29       that and try to start up on a privileged port. If for some reason that
30       isn't happening, take a look at the Net::SSH::Perl docs.
31
32       With that aside, to use Rhosts authentication the client sends a
33       request to the server to authenticate it, including the name of the
34       user trying to authenticate. The server uses its shosts.equiv,
35       hosts.equiv, etc. files to determine whether the user/host should be
36       allowed access.
37

AUTHOR & COPYRIGHTS

39       Please see the Net::SSH::Perl manpage for author, copyright, and
40       license information.
41
42
43
44perl v5.30.1                      2020-01-30   Net::SSH::Perl::Auth::Rhosts(3)
Impressum