From owner-freebsd-isp Wed Feb 18 11:35:07 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id LAA20710 for freebsd-isp-outgoing; Wed, 18 Feb 1998 11:35:07 -0800 (PST) (envelope-from owner-freebsd-isp@FreeBSD.ORG) Received: from gdi.uoregon.edu (gdi.uoregon.edu [128.223.170.30]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id LAA20621; Wed, 18 Feb 1998 11:34:46 -0800 (PST) (envelope-from dwhite@gdi.uoregon.edu) Received: from localhost (dwhite@localhost) by gdi.uoregon.edu (8.8.7/8.8.8) with SMTP id LAA13828; Wed, 18 Feb 1998 11:34:40 -0800 (PST) (envelope-from dwhite@gdi.uoregon.edu) Date: Wed, 18 Feb 1998 11:34:40 -0800 (PST) From: Doug White Reply-To: Doug White To: Benedikt Stockebrand cc: questions@FreeBSD.ORG, isp@FreeBSD.ORG Subject: Re: Books on security In-Reply-To: <873ehh41z3.fsf@devnull.ruhr.de> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-isp@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org On 18 Feb 1998, Benedikt Stockebrand wrote: > S/key is vulnerable to session hijacking, so ssh may be a better > choice. If you use rdist, ssh has the additional advantage that it > allows root to do run it while plain rsh won't. If you enable that option :) All my installs of SSH don't allow root logins. Doug White | University of Oregon Internet: dwhite@resnet.uoregon.edu | Residence Networking Assistant http://gladstone.uoregon.edu/~dwhite | Computer Science Major To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-isp" in the body of the message