From: "Nalin Dahyabhai" <[EMAIL PROTECTED]>
> As for TCP/IP connections, the program that's invoked to perform the
> login chores is usually hard-coded, if there even is one (for example,
> sshd just does whatever work it needs done itself, and rshd doesn't
> bother).
Not entirely correct. Most services use PAM, including rsh. Encrypted stuff
like ssh is the exception, not the rule :-)
# cat /etc/pam.d/rsh
#%PAM-1.0
auth required /lib/security/pam_rhosts_auth.so
auth required /lib/security/pam_nologin.so
account required /lib/security/pam_pwdb.so
session required /lib/security/pam_pwdb.so
Andreas Lund ([EMAIL PROTECTED])
-- Tel: +47 90.07.71.62 / +47 63.88.33.56
Ano-Tech Computers (http://www.atc.no/)
** Free tech support; If you can read this, your email appears to be OK **
_______________________________________________
Seawolf-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/seawolf-list