From owner-freebsd-arch Sat Sep 16 7: 1: 2 2000 Delivered-To: freebsd-arch@freebsd.org Received: from flood.ping.uio.no (flood.ping.uio.no [129.240.78.31]) by hub.freebsd.org (Postfix) with ESMTP id EFC9C37B42C for ; Sat, 16 Sep 2000 07:00:59 -0700 (PDT) Received: (from des@localhost) by flood.ping.uio.no (8.9.3/8.9.3) id QAA45237; Sat, 16 Sep 2000 16:00:51 +0200 (CEST) (envelope-from des@ofug.org) X-URL: http://www.ofug.org/~des/ X-Disclaimer: The views expressed in this message do not necessarily coincide with those of any organisation or company with which I am or have been affiliated. To: Cy Schubert - ITSD Open Systems Group Cc: Daniel Eischen , Will Andrews , Steve Kargl , arch@FreeBSD.ORG Subject: Re: Rsh/Rlogin/Rcmd & friends References: <200009152136.e8FLaou26312@cwsys.cwsent.com> From: Dag-Erling Smorgrav Date: 16 Sep 2000 16:00:51 +0200 In-Reply-To: Cy Schubert - ITSD Open Systems Group's message of "Fri, 15 Sep 2000 14:35:50 -0700" Message-ID: Lines: 13 User-Agent: Gnus/5.0802 (Gnus v5.8.2) Emacs/20.4 MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Sender: owner-freebsd-arch@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG Cy Schubert - ITSD Open Systems Group writes: > So what! That's the price of security. I believe that the > telnet/ftp/"r" commands shouldn't even be ports. We need to make it > difficult to install unsafe software on the system. That way the admin > would have to go to all the trouble to find the source for unsafe > software somewhere on the Net, port it, and install it. Then it's not > FreeBSD's fault if that admin's system is compromised. I'm glad you're not in charge. DES -- Dag-Erling Smorgrav - des@ofug.org To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-arch" in the body of the message