Date: Fri, 20 Feb 1998 23:04:56 -0500 From: "mlucas@verio.net" <mlucas@verio.net> To: Doug White <dwhite@resnet.uoregon.edu> Cc: questions@FreeBSD.ORG, isp@FreeBSD.ORG Subject: Re: Books on security Message-ID: <199802201109.LAA12759@sunoco.rust.net> In-Reply-To: <Pine.BSF.3.96.980218113342.13769L-100000@gdi.uoregon.edu> References: <873ehh41z3.fsf@devnull.ruhr.de>
next in thread | previous in thread | raw e-mail | index | archive | help
>> S/key is vulnerable to session hijacking, so ssh may be a better >> choice. If you use rdist, ssh has the additional advantage that it >> allows root to do run it while plain rsh won't. > >If you enable that option :) All my installs of SSH don't allow root >logins. The vanilla install of ssh in the ports directory does allow root logins (at least, on my systems). How can this be turned off? Thanks, ml To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-isp" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199802201109.LAA12759>