Subject: Re: behaviour of root .rhosts
To: None <cracauer@wavehh.hanse.de>
From: Takahiro Kanbe <taka@fxis.fujixerox.co.jp>
List: tech-net
Date: 10/10/1995 01:03:29
Hi.

On Mon, 9 Oct 1995 10:51:07 +0100 (MET)
	cracauer@wavehh.hanse.de (Martin Cracauer) writes:
> When /dev/ttyp? is not secure in /etc/ttys, I noticed that a .rhosts
> for root refuses rlogin to the system, but allowes `rsh <command>`
> with full su rights.
It's normal behavior, because the command executed by rsh(1) doesn't
have controlling tty like ttyp*.

> That makes no sense. Should it be changed to refuse rsh as well when
> ttyp* is not secure?
How do you handling it, if ttyp0 is secure and ttyp1 is unsecure?

Cheers.

--
Takahiro Kanbe <taka@fxis.fujixerox.co.jp>
FXIS(Fuji Xerox Information Systems Co., Ltd.)