>>>>> "Tanaka" == Tanaka Akira <[EMAIL PROTECTED]> writes:
    Tanaka> In article <[EMAIL PROTECTED]>,
    Tanaka>   Michael Richardson <[EMAIL PROTECTED]> writes:

    >> Systems that give shells out to people that have write access 
    >> are already open to running programs by clients.
    >> 
    >> So, this really affects people that use :pserver: with write
    >> access.

    Tanaka> The problem also affects carefully configured :ext: method using ssh.
    Tanaka> It is well known that :pserver: with write access is dangerous because
    Tanaka> it sends password in plain text and :ext: using ssh is recommended.

  I did not realize that people had done such things.
  
    Tanaka> But :ext: using ssh has a problem that it provides shell access in
    Tanaka> general.  So pedantic administrator (like me) disables shell access by
    Tanaka> a option `commands="cvs server"' in authorized_keys (and use chroot).

  Yes, I've done this. I didn't realize that it required :ext:?? Maybe I just
don't know CVS's newer methods well enough.

  I agree that things should be fixed. I am just not panic'ed about this.
  
] Train travel features AC outlets with no take-off restrictions|gigabit is no[
]   Michael Richardson, Solidum Systems, on my way to IETF#48   |problem  with[
]     [EMAIL PROTECTED]   www.solidum.com                         |PAX.port 1100[
] panic("Just another NetBSD/notebook using, kernel hacking, security guy");  [

Reply via email to