In article <[EMAIL PROTECTED]>,
  Michael Richardson <[EMAIL PROTECTED]> writes:

>   Systems that give shells out to people that have write access 
> are already open to running programs by clients.
> 
>   So, this really affects people that use :pserver: with write
> access.

The problem also affects carefully configured :ext: method using ssh.
It is well known that :pserver: with write access is dangerous because
it sends password in plain text and :ext: using ssh is recommended.

But :ext: using ssh has a problem that it provides shell access in
general.  So pedantic administrator (like me) disables shell access by
a option `commands="cvs server"' in authorized_keys (and use chroot).

The problem is the real problem in this case.  It provides general
access to server machine even if cvs server is running in chroot jail
and /bin/sh is not exist.

Maybe, the first problem I described is not so interesting other than
pedantic administrators.
(Second problem is more interesting for casual users, I think.)
-- 
Tanaka Akira

Reply via email to