Subject: Re: behaviour of root .rhosts
To: None <email@example.com>
From: Takahiro Kanbe <firstname.lastname@example.org>
Date: 10/10/1995 21:09:44
On Mon, 9 Oct 1995 17:20:40 +0100 (MET)
email@example.com (Martin Cracauer) writes:
> I can't imagine why anyone should handle ttyp*'s different.
Because rlogind(8) setup a pty for the login shell, but rshd(8)
dosen't. So, rshd(8) can't depend on ttys(5)'s secure flags.
> My point is, when the admin chooses not to allow root logins on
> network terminals, he probably wants command lines sent by rsh,
> blocked, too.
> A `rsh` command can change /etc/ttys and allows rlogin from that
> moment on, so my points stays that handling rsh and rlogin different
> makes no sense.
I see. Then, you need the another configuration file, which
controls accessing of root from remote machines. Ttys(5) could
simply control accessing by ttys, not user.
Takahiro Kanbe <firstname.lastname@example.org>
FXIS(Fuji Xerox Information Systems Co., Ltd.)