Linux - NewbieThis Linux forum is for members that are new to Linux.
Just starting out and have a question?
If it is not in the man pages or the how-to's this is the place!
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
We are planing to migrate our applications from Unix to Linux....
rhs was used in shell scripts, shell scripts poll the backup database which sits on different server, when we migrate from unix to linux both primary and backup databases sit on same server...
Is it necessary to change rhs to ssh in shell scripts ?
It is not mandatory but highly recommended. rsh does not use encryption for data transfer. ssh uses and hence more secure.
Dear Chaitanya,
Will there be much syntax differences between rsh and ssh ?
Also i did not find rshd daemon in fedora 9 ? rsh client is present...does rsh uses any other daemon ?
Will there be much syntax differences between rsh and ssh ?
Also i did not find rshd daemon in fedora 9 ? rsh client is present...does rsh uses any other daemon ?
Distribution: Solaris 9 & 10, Mac OS X, Ubuntu Server
Posts: 1,197
Rep:
Just a further comment on rsh vs. ssh -- even if I were not changing OS's, I would change from rsh to ssh. rsh is not secure for many reasons. It basically means that if anyone gets into one of your machines, they've got them all.
I use Amanda for backup. One option with it is to use ssh authentication and connections between backup server and clients. You can set up public key authentication, and you can restrict the keys. So, for example, the backup user on the server has a public key which is distributed to the clients. The client's backup user implements those keys with restrictions that allow them to be used only with one particular command (for backing up) and blocking portforwarding, x forwarding, etc. When I set something up like that, I typically reference http://sial.org/howto/openssh/publickey-auth/. The man page for sshd(8), `man -s 8 sshd`, also has details under Authorized_keys File Format. You end up with the ease of use of rsh, automatic login without passwords for automatic processes like backup, but with secure restrictions so that if someone were to break into one machine they wouldn't have access or free reign on any other machine.
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.