I'm would also consider it to be a hack (but, it works of now) if it works on
RH only. We have a number of debian systems here too (I run debian at home
as well). Another reason for me to further embrace ssh.



-- ____ __ | 0|___||. Andrew Gaunt - Computing Development Environment _| _| : : } Lucent Technologies: http://www-cde.mv.lucent.com/~quantum -(O)-==-o\ Personal: http://www.gaunt.org



[EMAIL PROTECTED] wrote:

That securetty file is only intended to be a list of
devices from which secure logins are allowed, so I think
it's likely that step #1 of your instructions is incorrect
since rlogin and ssh are services rather than devices.



On my RH8 system I did steps 2&3 first. Alone they did not work.
After then doing step 1 it worked fine.




Hmmm, I didn't test it but there are indeed some WWW pages
out there indicating that use of securetty has been extended
as you described, though this is apparently an RHAT-specific
hack - at least, my Debian system does not work this way.

















P.S.  If you can arrange for my email address to NOT
     appear in (the bodies of) your responses when
     broadcast to the world, I'd be much obliged,
     as I've so far managed to keep it from being
     harvested for SPAM abusage...


_______________________________________________
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss




_______________________________________________
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss

Reply via email to