From owner-freebsd-bugs Mon Feb 10 21:40:04 1997 Return-Path: Received: (from root@localhost) by freefall.freebsd.org (8.8.5/8.8.5) id VAA14274 for bugs-outgoing; Mon, 10 Feb 1997 21:40:04 -0800 (PST) Received: (from gnats@localhost) by freefall.freebsd.org (8.8.5/8.8.5) id VAA14256; Mon, 10 Feb 1997 21:40:01 -0800 (PST) Date: Mon, 10 Feb 1997 21:40:01 -0800 (PST) Message-Id: <199702110540.VAA14256@freefall.freebsd.org> To: freebsd-bugs Cc: From: John-Mark Gurney Subject: bin/706 .rhosts and unqualified hostnames Reply-To: John-Mark Gurney Sender: owner-bugs@FreeBSD.ORG X-Loop: FreeBSD.org Precedence: bulk The following reply was made to PR bin/706; it has been noted by GNATS. From: John-Mark Gurney To: kieber@sax.sax.de, freebsd-gnats-submit@freefall.FreeBSD.org Cc: Subject: bin/706 .rhosts and unqualified hostnames Date: Mon, 10 Feb 1997 21:31:45 -0800 (PST) ok... this problem still exists... but isn't it A Bad Thing (tm) to be trusting "outside" dns servers for those unqualified hostnames? because the root server could possibly be compromised or redirected to someone else's machine? should we possibly add a comment to hosts.equiv(5) that you shouldn't use unqualified dns entries for hostname? it's fine if you list the unqualified entries in something like /etc/hosts and put it to check hosts before going to dns... comments? John-Mark gurney_j@efn.org http://resnet.uoregon.edu/~gurney_j/ Modem/FAX: (541) 683-6954 (FreeBSD Box) Live in Peace, destroy Micro$oft, support free software, run FreeBSD (unix)