Subject: Re: behaviour of root .rhosts
To: None <cracauer@wavehh.hanse.de>
From: Takahiro Kanbe <taka@fxis.fujixerox.co.jp>
List: tech-net
Date: 10/10/1995 21:09:44
On Mon, 9 Oct 1995 17:20:40 +0100 (MET)
	cracauer@wavehh.hanse.de (Martin Cracauer) writes:
> I can't imagine why anyone should handle  ttyp*'s different.
Because rlogind(8) setup a pty for the login shell, but rshd(8)
dosen't.  So, rshd(8) can't depend on ttys(5)'s secure flags.

> My point is, when the admin chooses not to allow root logins on
> network terminals, he probably wants command lines sent by rsh,
> blocked, too. 
>
> A `rsh` command can change /etc/ttys and allows rlogin from that
> moment on, so my points stays that handling rsh and rlogin different
> makes no sense.
I see.  Then, you need the another configuration file, which
controls accessing of root from remote machines.  Ttys(5) could
simply control accessing by ttys, not user.

--
Takahiro Kanbe <taka@fxis.fujixerox.co.jp>
FXIS(Fuji Xerox Information Systems Co., Ltd.)