Go to main content

man pages section 1: User Commands

Exit Print View

Updated: Wednesday, July 27, 2022



rlogin - remote login


rlogin [-8ELKa] [-e c] [-l username] hostname
hostname [-8ELKa] [-e c] [-l username]



Caution  -  All data exchanges over this protocol are performed without encryption, and have no protection against spoofing or snooping of traffic. The in.rlogind server is disabled by default on Oracle Solaris and most other modern operating systems, and both the in.rlogind server and the rlogin command may be removed in future versions of Oracle Solaris. Use of the ssh(1) utility is strongly recommended instead.

The rlogin utility establishes a remote login session from your terminal to the remote machine named hostname.

Hostnames are provided by the hosts(5) name service. Each host has one official name (the first name in the database entry), and optionally one or more nicknames. Either official hostnames or nicknames can be specified in hostname.

If the name of the file from which rlogin is executed is anything other than rlogin, rlogin takes this name as its hostname argument. This allows you to create a symbolic link to rlogin in the name of a host which, when executed, invokes a remote shell on that host. By creating a directory and populating it with symbolic links in the names of commonly used hosts, then including the directory in your shell's search path, you can run rlogin by typing hostname to your shell.

The remote terminal type is the same as your local terminal type, as given in your environment TERM variable. The terminal or window size is also copied to the remote system if the server supports the option. Changes in size are reflected as well. All echoing takes place at the remote site, so that (except for delays) the remote login is transparent. Flow control using Control-S and Control-Q and flushing of input and output on interrupts are handled properly.


The following options are supported:


Passes eight-bit data across the net instead of seven-bit data.

–a, –K

Forces the remote machine to ask for a password by sending a null local username.

–e c

Specifies a different escape character, c, for the line used to disconnect from the remote host.


Stops any character from being recognized as an escape character.

–l username

Specifies a different username for the remote login. If you do not use this option, the remote username used is the same as your local username.


Allows the rlogin session to be run in “litout” mode.

Escape Sequences

Lines that you type which start with the tilde character (~) are “escape sequences.” The escape character can be changed using the –e option.


Disconnects from the remote host. This is not the same as a logout, because the local host breaks the connection with no warning to the remote end.


Suspends the login session, but only if you are using a shell with Job Control. susp is your “suspend” character, usually Control-Z. See tty(1).


Suspends the input half of the login, but output is still able to be seen (only if you are using a shell with Job Control). dsusp is your “deferred suspend” character, usually Control-Y. See tty(1).



The remote machine on which rlogin establishes the remote login session.


Each remote machine can have a file named /etc/hosts.equiv containing a list of trusted host names with which it shares user names. Users with the same user name on both the local and remote machine can rlogin from the machines listed in the remote machine's /etc/hosts.equiv file without supplying a password. Individual users can set up a similar private equivalence list with the file .rhosts in their home directories. Each line in this file contains two names, that is, a host name and a user name, separated by a space. An entry in a remote user's .rhosts file permits the user named username who is logged into hostname to log in to the remote machine as the remote user without supplying a password. If the name of the local host is not found in the /etc/hosts.equiv file on the remote machine, and the local user name and host name are not found in the remote user's .rhosts file, then the remote machine prompts for a password. Host names listed in the /etc/hosts.equiv and .rhosts files must be the official host names listed in the hosts database. Nicknames can not be used in either of these files.

For security reasons, the .rhosts file must be owned by either the remote user or by root.



List of trusted hostnames with shared user names.


Message displayed to users attempting to login during system maintenance.


Private list of trusted hostname/username combinations.


See attributes(7) for descriptions of the following attributes:

Interface Stability

See Also

rsh(1), ssh(1), stty(1), tty(1), hosts(5), hosts.equiv(5), nologin(5), attributes(7), in.rlogind(8)


The following message indicates that the machine is in the process of being shutdown and logins have been disabled:

NO LOGINS: System going down in N minutes


When a system is listed in hosts.equiv, its security must be as good as local security. One insecure system listed in hosts.equiv can compromise the security of the entire system.

This implementation can only use the TCP network service.

This technology may be removed in a future release of Oracle Solaris.


Support for Kerberos, including the options –a, –f, –F, –k, –K, –x, and –X, was added in Solaris 10 3/05 and removed in Oracle Solaris 11.4.0. Prior to Solaris 10, a kerberized version was available in the Sun Enterprise Authentication Mechanism (SEAM) add-on package for Solaris.

Support for IPv6 was added in Solaris 8.

Support for the –E option was added in Solaris 2.0.

The rlogin command, including support for the options –8, –e, –l, and –L, has been present since the initial release of Solaris.