1 .\" $NetBSD: rsh.1,v 1.20 2005/03/11 02:45:24 ginsbach Exp $
3 .\" Copyright (c) 1983, 1990, 1993
4 .\" The Regents of the University of California. All rights reserved.
6 .\" Redistribution and use in source and binary forms, with or without
7 .\" modification, are permitted provided that the following conditions
9 .\" 1. Redistributions of source code must retain the above copyright
10 .\" notice, this list of conditions and the following disclaimer.
11 .\" 2. Redistributions in binary form must reproduce the above copyright
12 .\" notice, this list of conditions and the following disclaimer in the
13 .\" documentation and/or other materials provided with the distribution.
14 .\" 3. Neither the name of the University nor the names of its contributors
15 .\" may be used to endorse or promote products derived from this software
16 .\" without specific prior written permission.
18 .\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
19 .\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
20 .\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
21 .\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
22 .\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
23 .\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
24 .\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
25 .\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
26 .\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
27 .\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30 .\" @(#)rsh.1 8.2 (Berkeley) 4/29/95
58 copies its standard input to the remote command, the standard
59 output of the remote command to its standard output, and the
60 standard error of the remote command to its standard error.
61 Interrupt, quit and terminate signals are propagated to the remote
64 normally terminates when the remote command does.
65 The options are as follows:
66 .Bl -tag -width XlXusernameX
68 Use IPv4 addresses only.
70 Use IPv6 addresses only.
74 option turns on socket debugging (using
78 sockets used for communication with the remote host.
80 By default, the remote username is the same as the local username.
85 format allow the remote name to be specified.
89 option redirects input from the special device
93 section of this manual page).
97 instead of the one assigned to the service
99 May be given either as symbolic name or as number.
100 If no command is given, note that
102 is started, which may need a different daemon
106 running on the server; you want to pass the
108 port number in that case.
113 is specified, you will be logged in on the remote host using
116 Shell metacharacters which are not quoted are interpreted on local machine,
117 while quoted metacharacters are interpreted on the remote machine.
118 For example, the command
120 .Dl rsh otherhost cat remotefile \*[Gt]\*[Gt] localfile
122 appends the remote file
128 .Dl rsh otherhost cat remotefile \&"\*[Gt]\*[Gt]\&" other_remotefile
133 .Ar other_remotefile .
135 .\" Many sites specify a large number of host names as commands in the
138 .\" If this directory is included in your search path, you can use the
141 .\" for the longer form
142 .\" .Dq rsh host command .
144 .Bl -tag -width /etc/hosts -compact
164 in the background without redirecting its input away from the terminal,
165 it will block even if no reads are posted by the remote command.
166 If no input is desired you should redirect the input of
174 You cannot run an interactive command (like
184 Stop signals stop the local
186 process only; this is arguably wrong, but currently hard to fix for reasons
187 too complicated to explain here.