I'm would also consider it to be a hack (but, it works of now) if it works on
RH only. We have a number of debian systems here too (I run debian at home
as well). Another reason for me to further embrace ssh.
-- ____ __ | 0|___||. Andrew Gaunt - Computing Development Environment _| _| : : } Lucent Technologies: http://www-cde.mv.lucent.com/~quantum -(O)-==-o\ Personal: http://www.gaunt.org
[EMAIL PROTECTED] wrote:
That securetty file is only intended to be a list of
devices from which secure logins are allowed, so I think
it's likely that step #1 of your instructions is incorrect
since rlogin and ssh are services rather than devices.
On my RH8 system I did steps 2&3 first. Alone they did not work.
After then doing step 1 it worked fine.
Hmmm, I didn't test it but there are indeed some WWW pages out there indicating that use of securetty has been extended as you described, though this is apparently an RHAT-specific hack - at least, my Debian system does not work this way.
P.S. If you can arrange for my email address to NOT appear in (the bodies of) your responses when broadcast to the world, I'd be much obliged, as I've so far managed to keep it from being harvested for SPAM abusage...
_______________________________________________
gnhlug-discuss mailing list
[EMAIL PROTECTED]
http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss
_______________________________________________ gnhlug-discuss mailing list [EMAIL PROTECTED] http://mail.gnhlug.org/mailman/listinfo/gnhlug-discuss