From owner-freebsd-security Wed May 10 16:24:45 2000 Delivered-To: freebsd-security@freebsd.org Received: from silby.com (adam042-051.resnet.wisc.edu [146.151.42.51]) by hub.freebsd.org (Postfix) with SMTP id 32C1837BA52 for ; Wed, 10 May 2000 16:24:37 -0700 (PDT) (envelope-from silby@silby.com) Received: (qmail 28817 invoked by uid 1000); 10 May 2000 23:24:35 -0000 Received: from localhost (sendmail-bs@127.0.0.1) by localhost with SMTP; 10 May 2000 23:24:35 -0000 Date: Wed, 10 May 2000 18:24:35 -0500 (CDT) From: Mike Silbersack To: security@freebsd.org Subject: Re: envy.vuurwerk.nl daily run output In-Reply-To: <20000510171745.E61969@linkfast.net> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-security@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.org On Wed, 10 May 2000, Matthew Fuller wrote: > On Wed, May 10, 2000 at 04:42:54PM -0500, a little birdie told me > that Mike Silbersack remarked > > > > See, I'm not sure that authorized_keys are user files, as they perform the > > same function that system passwords do. And since ssh is now part of the > > base system, they should be considered equal in importance to the password > > file. > > Well, consider that authorized_keys files perform the same function as > .rhosts. Would you propose doing the same for them? I don't use telnet/rshd/etc, so I don't care about them. But in a paranoid system, I suppose they would be tracked. Mike "Silby" Silbersack To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message