From owner-freebsd-hackers Fri Dec 5 16:59:26 1997 Return-Path: Received: (from root@localhost) by hub.freebsd.org (8.8.7/8.8.7) id QAA00177 for hackers-outgoing; Fri, 5 Dec 1997 16:59:26 -0800 (PST) (envelope-from owner-freebsd-hackers) Received: from wcc.wcc.net (wcc.wcc.net [208.6.232.10]) by hub.freebsd.org (8.8.7/8.8.7) with ESMTP id QAA00172 for ; Fri, 5 Dec 1997 16:59:22 -0800 (PST) (envelope-from detlev!joelh@wcc.wcc.net) Received: from detlev.UUCP (ppp90.wcc.net [208.6.232.90]) by wcc.wcc.net (8.8.7/8.8.7) with ESMTP id SAA19821; Fri, 5 Dec 1997 18:56:26 -0600 (CST) Received: (from joelh@localhost) by detlev.UUCP (8.8.7/8.8.7) id SAA20429; Fri, 5 Dec 1997 18:59:00 -0600 (CST) (envelope-from joelh) Date: Fri, 5 Dec 1997 18:59:00 -0600 (CST) Message-Id: <199712060059.SAA20429@detlev.UUCP> To: mrcpu@cdsnet.net CC: jbryant@unix.tfs.net, ircadmin@shellnet.co.uk, freebsd-hackers@freebsd.org In-reply-to: (message from Jaye Mathisen on Fri, 5 Dec 1997 13:40:00 -0800 (PST)) Subject: Re: Telnet Root access From: Joel Ray Holveck Reply-to: joelh@gnu.org References: Sender: owner-freebsd-hackers@freebsd.org X-Loop: FreeBSD.org Precedence: bulk > I'm not sure how I see su helping. If he has to telnet in as a normal > user, then su to root, he still has to send the root password in the > clear. > Seems like one of the encrypting telnet's, or ssh is the only real way... > Or only use root on the console. Perhaps because two passwords have to have been compromised for an intruder on an insecure console to gain entry. -- Joel Ray Holveck - joelh@gnu.org - http://www.wp.com/piquan Fourth law of programming: Anything that can go wrong wi sendmail: segmentation violation - core dumped