Berkeley r-commands
The Berkeley r-commands are a suite of computer programs designed to enable users of one Unix system to log in or issue commands to another Unix computer via TCP/IP computer network. The r-commands were developed in 1982 by the Computer Systems Research Group at the University of California, Berkeley, based on an early implementation of TCP/IP.
The CSRG incorporated the r-commands into their Unix operating system, the Berkeley Software Distribution. The r-commands premiered in BSD v4.1. Among the programs in the suite are: , , , ,,, and .
The r-commands were a significant innovation, and became de facto standards for Unix operating systems. With wider public adoption of the Internet, their inherent security vulnerabilities became a problem, and beginning with the development of Secure Shell protocols and applications in 1995, its adoption entirely supplanted the deployment and use of r-commands on networked systems.
Protocol
The original Berkeley package that provides also features and rsh.As an example, the protocol is as follows:
Client:
user name on the client
user name on the server
terminal type/terminal baud rate
Server:
For example:
Client:
bostic
kbostic
vt100/9600
Server:
and uses the same format. The following shows some aspects of the format:
host1
host2 user_a
-host3
+@group1 -user_b
-@group2
Commands
rlogin
enables a user to log in on another server via computer network, using TCP network port 513.is also the name of the application layer protocol used by the software, part of the TCP/IP protocol suite. Authenticated users can act as if they were physically present at the computer. RFC 1282, in which it was defined, states: "The facility provides a remote-echoed, locally flow-controlled virtual terminal with proper flushing of output." communicates with a daemon,, on the remote host. is similar to the Telnet command, but is not as customizable and is able to connect only to Unix-like hosts.
rsh
opens a shell on a remote computer without a login procedure. Once connected, the user can execute commands on the remote computer through the shell's command-line interface. passes input and output through the standard streams, and it sends standard output to the user's console. Over the network, standard input and standard out flow through TCP port 514, while Standard Error flows through a different TCP port, which the daemon opens.rexec
Like, enables the user to run shell commands on a remote computer. However, unlike the rsh server, the server requires login: it authenticates users by reading the username and password from the network socket. uses TCP port 512.rcp
can copy a file or directory from the local system to a remote system, from a remote system to the local system, or from one remote system to another. The command line arguments of and are similar, but in remote files are prefixed with the name of the remote system:rcp file.txt subdomain.domain:~/home/foo/file.txt
As with the Unix copy command cp, overwrites an existing file of the same name in the target; unlike, it provides no mechanism for warning the user before overwriting the target file. Like, uses TCP port 514.
rwho
Just as the who command lists the users who are logged in to the local Unix system, lists those users who are logged into all multi-user Unix systems on the local network. It displays the user name, the name of the host from which the user is connected, and the start date and time of the login session.'s daemon,, maintains a database of the status of Unix systems on the local network. The daemon and its database are also used by the program. Unlike the finger protocol, rwho does not display information from users'
.plan or .project files, such as a user's real name or email address.rstat
returns performance statistics from the kernel.ruptime
Just as the command shows how long a Unix system has been running since the last restart, requests a status report from all computers on the local network. It then returns the uptime report. If a computer did not respond within the time limit, then reports that the system is down. This information is tracked and stored by the daemon, which is also used by the rwho command.Security
Those r-commands which involve user authentication share several serious security vulnerabilities:- All information, including passwords, is transmitted unencrypted.
- The file is easy to misuse. They are designed to allow logins without a password, but their reliance on remote usernames, hostnames, and IP addresses is exploitable. For this reason many corporate system administrators prohibit files, and actively scrutinize their networks for offenders.
- The protocol partly relies on the remote party's client to provide information honestly, including source port and source host name. A malicious client can forge this and gain access, as the protocol has no means of authenticating the client is running on a trusted machine. It also cannot check if the requesting client on a trusted machine is the real client, meaning that malicious programs may pretend to be a standard-conforming client by using the same protocols.
- The common practice of mounting users' home directories via Network File System exposes rlogin to attack by means of fake files - this means that any of its security faults automatically plague.