On Tue, 24 Jul 2001, Andreas Lund wrote:
> From: "Nalin Dahyabhai" <[EMAIL PROTECTED]>
> > As for TCP/IP connections, the program that's invoked to perform the
> > login chores is usually hard-coded, if there even is one (for example,
> > sshd just does whatever work it needs done itself, and rshd doesn't
> > bother).
>
> Not entirely correct. Most services use PAM, including rsh. Encrypted stuff
> like ssh is the exception, not the rule :-)
>
> # cat /etc/pam.d/rsh
> #%PAM-1.0
> auth required /lib/security/pam_rhosts_auth.so
> auth required /lib/security/pam_nologin.so
> account required /lib/security/pam_pwdb.so
> session required /lib/security/pam_pwdb.so
>
>
Depending on how openssh is compiled, it may also use PAM.
_______________________________________________
Seawolf-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/seawolf-list