home *** CD-ROM | disk | FTP | other *** search
- Newsgroups: alt.security
- Path: sparky!uunet!nevada.edu!jimi!duke.cs.unlv.edu!greg
- From: greg@duke.cs.unlv.edu (Greg Wohletz)
- Subject: Re: Fooling DNS-based authentication
- Message-ID: <1993Jan1.000159.21674@unlv.edu>
- Sender: news@unlv.edu (News User)
- Reply-To: greg@duke.cs.unlv.edu (Greg Wohletz)
- Organization: UNLV Computer Science and Electrical Engineering
- References: <1992Dec29.155917.848@ghost.dsi.unimi.it>
- Date: Fri, 1 Jan 93 00:01:59 GMT
- Lines: 18
-
- In article <1992Dec29.155917.848@ghost.dsi.unimi.it>, vince@ghost.dsi.unimi.it (David Vincenzetti) writes:
- ) I've been experimenting with ~/.rhosts and /etc/hosts.equiv security
- ) with Sun machines lately, and I've found some interesting things I
- ) would like to discuss.
-
- Yes, rsh/rlogin and friends are completely insecure...
-
- ) I'm truly
- ) interested in the matter since I'm adminstrating the security of
- ) many machines, including Suns. Many thanks in advance.
-
- If you're actually concerned with security, then you would be well
- advised to comment rshd and rlogind out of your inetd.conf files. If
- you're only mildly concerned about security you could use Wietse
- Venema's tcpd to restrict what addresses you accept connections on
- those ports from.
-
- --Greg
-