From owner-freebsd-questions Tue Jan 7 02:55:03 1997 Return-Path: Received: (from root@localhost) by freefall.freebsd.org (8.8.4/8.8.4) id CAA14884 for questions-outgoing; Tue, 7 Jan 1997 02:55:03 -0800 (PST) Received: from pcpsj.pfcs.com (TfpiOGnhoUhWxu7IT6kKcIjYpUjYn2ew@harlan.fred.net [205.252.219.31]) by freefall.freebsd.org (8.8.4/8.8.4) with SMTP id CAA14876 for ; Tue, 7 Jan 1997 02:54:58 -0800 (PST) Received: from mumps.pfcs.com (mumps.pfcs.com [192.52.69.11]) by pcpsj.pfcs.com (8.6.12/8.6.9) with SMTP id FAA24179 for ; Tue, 7 Jan 1997 05:54:28 -0500 Received: from localhost by mumps.pfcs.com with SMTP id AA19668 (5.67b/IDA-1.5 for ); Tue, 7 Jan 1997 05:54:27 -0500 To: freebsd-questions@freebsd.org Subject: Re: Why aren't the ptys in /etc/ttys secure by default? Date: Tue, 07 Jan 1997 05:54:25 -0500 Message-Id: <19666.852634465@mumps.pfcs.com> From: Harlan Stenn Sender: owner-questions@freebsd.org X-Loop: FreeBSD.org Precedence: bulk I got several responses, and I've thanked them all privately. Just to fill in some gaps, I run tcpd for all of my internet services, and I require an S/key password for network logins. I also run ssh. There's probably something else I'm doing, but I forget what it is at the moment. Does this seem like "enough" security to keep the pty's secure? Without secure ptys, it's not possible to log in as root from an xterm. H