.rhosts and security

Gary Barnette gbarnet at uswnvg.UUCP
Wed Jun 26 03:20:55 AEST 1991



I would like to know how some sights handle the incredible
security hole opened up when a system crashes or a system
is down for scheduled maintanance.

A PC with the rsh command or a workstation can change their 
IP address and reboot, effectively mascarading as the downed 
multi-user machine. It can then preform rlogin's or rsh's as 
ROOT (or another user) to any another multi-user unix system 
that has the downed system in their .rhosts file.

I know that this is not a new problem and the removal of the
.rhosts files would prevent it but as an administrator I don't
know if I want to be a victim of my own policy.

Would Kerberos cure this security illness?

Thanks to all that contribute,

Gary Barnette
US West NewVector
{uunet, sequent}!uswnvg!gbarnet



More information about the Comp.unix.admin mailing list