1 .\" Copyright (c) 1983, 1990, 1993
2 .\" The Regents of the University of California. All rights reserved.
4 .\" Redistribution and use in source and binary forms, with or without
5 .\" modification, are permitted provided that the following conditions
7 .\" 1. Redistributions of source code must retain the above copyright
8 .\" notice, this list of conditions and the following disclaimer.
9 .\" 2. Redistributions in binary form must reproduce the above copyright
10 .\" notice, this list of conditions and the following disclaimer in the
11 .\" documentation and/or other materials provided with the distribution.
12 .\" 3. All advertising materials mentioning features or use of this software
13 .\" must display the following acknowledgement:
14 .\" This product includes software developed by the University of
15 .\" California, Berkeley and its contributors.
16 .\" 4. Neither the name of the University nor the names of its contributors
17 .\" may be used to endorse or promote products derived from this software
18 .\" without specific prior written permission.
20 .\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
21 .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22 .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23 .\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
24 .\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25 .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26 .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28 .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29 .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
32 .\" @(#)rsh.1 8.1 (Berkeley) 6/6/93
33 .\" $FreeBSD: src/usr.bin/rsh/rsh.1,v 1.21 2005/07/14 20:29:07 brueffer Exp $
34 .\" $DragonFly: src/usr.bin/rsh/rsh.1,v 1.2 2003/06/17 04:29:31 dillon Exp $
59 utility copies its standard input to the remote command, the standard
60 output of the remote command to its standard output, and the
61 standard error of the remote command to its standard error.
62 Interrupt, quit and terminate signals are propagated to the remote
65 normally terminates when the remote command does.
66 The options are as follows:
69 Use IPv4 addresses only.
71 Use IPv6 addresses only.
73 Turn on socket debugging (using
77 sockets used for communication with the remote host.
82 By default, the remote username is the same as the local username.
83 Authorization is determined
87 Redirect input from the special device
91 section of this manual page).
95 to be specified (in seconds).
97 data is sent or received in this time,
104 is specified, you will be logged in on the remote host using
107 Shell metacharacters which are not quoted are interpreted on local machine,
108 while quoted metacharacters are interpreted on the remote machine.
109 For example, the command
111 .Dl rsh otherhost cat remotefile >> localfile
113 appends the remote file
119 .Dl rsh otherhost cat remotefile \&">>\&" other_remotefile
124 .Ar other_remotefile .
126 .\" Many sites specify a large number of host names as commands in the
127 .\" directory /usr/hosts.
128 .\" If this directory is included in your search path, you can use the
129 .\" shorthand ``host command'' for the longer form ``rsh host command''.
131 .Bl -tag -width /etc/hosts -compact
133 .It Pa /etc/auth.conf
155 in the background without redirecting its input away from the terminal,
156 it will block even if no reads are posted by the remote command.
157 If no input is desired you should redirect the input of
165 You cannot run an interactive command
176 Stop signals stop the local
178 process only; this is arguably wrong, but currently hard to fix for reasons
179 too complicated to explain here.