Enabling RSH and REXEC protocols for cube servers on Solaris 10, Linux, and AIX

If you have a cube server on a remote host on Solaris 10, Linux, or iSeries®, you need to enable the RSH or REXEC protocol on the remote hose so that you can manage the cube server from the Administration Console.

To enable the RSH or REXEC protocol for a cube servers on Solaris 10, Linux, or AIX®:

  1. Log in to the remote host as the root user.
  2. Make the following changes to enable the protocol. The commands below show how to enable both the RSH protocol and the REXEC protocol. You need to enable only the protocol that you selected for the Connection type option when you created the remote cube server. You do not need to enable both protocols.
    Option Description
    For Solaris 10
    1. Add the following commands into the /etc/inetd.conf file.
      RSHD - rsh daemon (BSD protocols)
      shell stream tcp nowait root /usr/sbin/in.rshd in.rshd
      shell stream tcp6 nowait root /usr/sbin/in.rshd in.rshd
    2. Ensure that the name and IP address of the local host is in the /etc/hosts file on the remote host, and ensure that the name and IP address of the remote host is in the /etc/hosts file on the local host.
    3. Add the name of the local host and the user ID that is used to log into the remote host to the $HOME/.rhosts file on the target host. For example, if you want to log in to machineB from machineA as user db2inst1, then add the following line to the $HOME/.rhosts file on machineB:
      machineA  db2inst1
    4. Run the following commands:
      svcadm enable svc:/network/inetd:default
      svcadm enable svc:/network/login:rlogin
      svcadm enable svc:/network/shell:default
      svcadm enable rexec
      svcadm restart inetd
    For Linux
    1. Add the following two lines to the end of the /etc/securetty file.
      rsh
      rexec
    2. Ensure that the name and IP address of the local host is in the /etc/hosts file on the remote host, and ensure that the name and IP address of the remote host is in the /etc/hosts file on the local host.
    3. Add the name of the local host and the user ID that is used to log in to the remote host to the $HOME/.rhosts file on the target host. For example, if you want to log in to machineB from machineA as user db2inst1, then add the following line to the $HOME/.rhosts file on machineB:
      machineA  db2inst1
    4. Enable RSH or REXEC by running one of the following commands
      chkconfig rsh on
      chkconfig rexec on
    5. Edit the /etc/pam.d/login and /etc/pam.d/rsh files to comment out the following line by inserting a number sign (#) in front of it, as follows:
      # auth required pam_securetty.so
    6. In the file /etc/pam.d/login, replace all occurrences of auth required with auth sufficient .
    7. Run the following commands:
      chkconfig xinetd on
      /etc/init.d/xinetd restart
    For AIX
    1. Make sure that the following two lines in the /etc/inetd.conf file are not commented out.
      shell stream tcp6 nowait root /usr/sbin/rshd rshd
      exec stream tcp6 nowait root /usr/sbin/rexecd rexecd
    2. Ensure that the name and IP address of the local host is in the /etc/hosts file on the remote host, and ensure that the name and IP address of the remote host is in the /etc/hosts file on the local host.
    3. Add the name of the local host and the user ID that is used to log into the remote host to the $HOME/.rhosts file on the target host. For example, if you want to log in to machineB from machineA as user db2inst1, then add the following line to the $HOME/.rhosts file on machineB:
      machineA  db2inst1
    4. Make sure that the following lines in /etc/pam.conf are not commented out.
      rsh auth      sufficient   /usr/lib/security/pam_rhosts_auth
      rsh account   required     /usr/lib/security/pam_aix
      rsh session   required     /usr/lib/security/pam_aix


Feedback | Information roadmap