delorie.com/archives/browse.cgi | search |
> Regardless, to me it's still would be a large security hole if all one > needs to do is: > > $ echo "+" > ~/.rhosts > > to be able to abuse rsh to do something under somebody else's user ID is > it not? rsh is inherently insecure. Attempts to make it secure are not worthwhile (in fact, they tend to break rsh). Especially in the land of NT insecurity, trying to make rsh secure simply makes it unusable. HTH, Peter > > > > -- > Unsubscribe info: http://cygwin.com/ml/#unsubscribe-simple > Bug reporting: http://cygwin.com/bugs.html > Documentation: http://cygwin.com/docs.html > FAQ: http://cygwin.com/faq/ > -- Unsubscribe info: http://cygwin.com/ml/#unsubscribe-simple Bug reporting: http://cygwin.com/bugs.html Documentation: http://cygwin.com/docs.html FAQ: http://cygwin.com/faq/
webmaster | delorie software privacy |
Copyright © 2019 by DJ Delorie | Updated Jul 2019 |