+2002-08-07 Jen Selby <jenselby@mit.edu>
+
+ * klogind.M, kshd.M, login.M: changed manual sections 8c, 1c, and
+ 3x to 8, 1, and 3, respectively
+ * rcp.M, rlogin.M, rsh.M: added references to the server manpages
+
2002-07-12 Ken Raeburn <raeburn@mit.edu>
* v4rcp.c: Include port-sockets.h.
.\" All rights reserved. The Berkeley software License Agreement
.\" specifies the terms and conditions for redistribution.
.\"
-.\" @(#)rlogind.8c 6.3 (Berkeley) 5/24/86
+.\" @(#)rlogind.8 6.3 (Berkeley) 5/24/86
.\"
-.TH KLOGIND 8C
+.TH KLOGIND 8
.SH NAME
klogind \- remote login server
.SH SYNOPSIS
.SH DESCRIPTION
.I Klogind
is the server for the
-.IR rlogin (1C)
+.IR rlogin (1)
program. The server is
-based on rlogind(8C) but uses Kerberos authentication.
+based on rlogind(8) but uses Kerberos authentication.
.PP
The
.I klogind
-server is invoked by \fIinetd(8c)\fP when it receives a connection on
+server is invoked by \fIinetd(8)\fP when it receives a connection on
the port indicated in /etc/inetd.conf. A typical /etc/inetd.conf
configuration line for \fIklogind\fP might be:
The parent of the login process manipulates the master side of the
pseduo terminal, operating as an intermediary between the login
process and the client instance of the
-.I rlogin(1C)
+.I rlogin(1)
program. In normal operation, the packet protocol described in
.IR pty (4)
is invoked to provide ^S/^Q type facilities and propagate interrupt
.br
The user's login shell could not be started.
.SH SEE ALSO
-rlogind(8C), rlogin(1C)
+rlogind(8), rlogin(1)
.SH BUGS
A more extensible protocol should be used.
.\" All rights reserved. The Berkeley software License Agreement
.\" specifies the terms and conditions for redistribution.
.\"
-.\" @(#)rshd.8c 6.3 (Berkeley) 5/24/86
+.\" @(#)rshd.8 6.3 (Berkeley) 5/24/86
.\"
-.TH KRSHD 8C
+.TH KRSHD 8
.SH NAME
kshd \- kerberized remote shell server
.SH SYNOPSIS
.SH DESCRIPTION
.I Krshd
is the server for the
-.IR rcmd (3X)
+.IR rcmd (3)
routine and, consequently, for the
-.IR rsh (1C)
+.IR rsh (1)
program. The server provides remote execution facilities
with authentication based on privileged port numbers from trusted hosts or
the Kerberos authentication system.
.BR stderr ,
and is not preceded by a flag byte.
.SH SEE ALSO
-rshd(8C), rsh(1C),
-rcmd(3X)
+rshd(8), rsh(1),
+rcmd(3)
.SH BUGS
A facility to allow all data exchanges to be encrypted should be
present.
.\" login.1
.\"
-.TH LOGIN 8C
+.TH LOGIN 8
.SH NAME
login.krb5 \- kerberos enhanced login program
.SH SYNOPSIS
.BR stderr.
.PP
.SH SEE ALSO
-rlogind(8C), rlogin(1C), telnetd(8c)
+rlogind(8), rlogin(1), telnetd(8)
.SH BUGS
Should use a config file to select use of V5, V4, and AFS, as well as
policy for startup.
(on remote host) - file containing Kerberos principals that are allowed
access.
.SH SEE ALSO
-cp(1), ftp(1), rsh(1), rlogin(1), kerberos(3), krb_getrealm(3), rcp(1)
+cp(1), ftp(1), rsh(1), rlogin(1), kerberos(3), krb_getrealm(3), kshd(8), rcp(1)
[UCB version]
.SH BUGS
.B Rcp
Use Kerberos V4 authentication only; don't try Kerberos V5.
.SH SEE ALSO
rsh(1), kerberos(3), krb_sendauth(3), krb_realmofhost(3), rlogin(1) [UCB
-version]
+version], klogind(8)
.SH FILES
.TP "\w'~/\&.k5login\ \ 'u"
~/\&.k5login
.\"
.\" @(#)rsh.1 6.2 (Berkeley) 9/20/88
.\" "
-.TH RSH
+.TH RSH 1
.SH NAME
rsh \- remote shell
.SH SYNOPSIS
(on remote host) - file containing Kerberos principals that are allowed
access.
.SH SEE ALSO
-rlogin(1), kerberos(3), krb_sendauth(3), krb_realmofhost(3)
+rlogin(1), kerberos(3), krb_sendauth(3), krb_realmofhost(3), kshd(8)
.SH BUGS
If you are using
.IR csh (1)