From owner-freebsd-isp Wed May 13 03:11:00 1998 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id DAA26988 for freebsd-isp-outgoing; Wed, 13 May 1998 03:11:00 -0700 (PDT) (envelope-from owner-freebsd-isp@FreeBSD.ORG) Received: from caladan.tdx.co.uk (caladan.tdx.co.uk [195.188.177.4]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id DAA26964 for ; Wed, 13 May 1998 03:10:57 -0700 (PDT) (envelope-from kpielorz@tdx.co.uk) Received: from tdx.co.uk (lorca-tx.tdx.co.uk [195.188.177.242]) by caladan.tdx.co.uk (8.8.8/8.8.8) with ESMTP id LAA28777 for ; Wed, 13 May 1998 11:10:58 +0100 (BST) (envelope-from kpielorz@tdx.co.uk) Message-ID: <355971B9.23080379@tdx.co.uk> Date: Wed, 13 May 1998 11:11:05 +0100 From: Karl Pielorz Organization: TDX X-Mailer: Mozilla 4.04 [en] (WinNT; I) MIME-Version: 1.0 To: isp@FreeBSD.ORG Subject: Rhosts question... Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit Sender: owner-freebsd-isp@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org Hi All, I've now got quite a 'farm' of FreeBSD boxes on our network (around 8 in total), which I have to log into on a daily basis to set things up on, maintain etc... My question is about .rhosts Up until now, I've avoided them as the source of 'all-evil' etc. - as a lot of the books I've been reading do make them out to be very nasty things indeed... I've just read one article though that was refering to the way implementing .rhosts can stop you from having to send the root password accross the network, and therefore is a more 'secure' way of constantly logging into machines as root etc. Has anyone got any comments on this? I guess I really should look at setting up SSH if it's bothering me that much... ;-) Kp To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-isp" in the body of the message