On Wed, Mar 06, 2002 at 01:56:07PM -0800, Andrew DeFaria wrote: > OK then, seems to me that su might be implementable by using a service > that runs as SYSTEM and takes requests to switch user from user A to > user B. Possible?
Sure. It's exactly the way the user switch is implemented in 2K/XP. > Regardless, to me it's still would be a large security hole if all one > needs to do is: > > $ echo "+" > ~/.rhosts > > to be able to abuse rsh to do something under somebody else's user ID is > it not? It's the same on U*X. If you don't care for the permissions of your home directory you're out of luck. And rsh is a dangerous service anyway. If you don't want it, just remove the matching line in /etc/inetd.conf and use ssh. Corinna -- Corinna Vinschen Please, send mails regarding Cygwin to Cygwin Developer mailto:[EMAIL PROTECTED] Red Hat, Inc. -- Unsubscribe info: http://cygwin.com/ml/#unsubscribe-simple Bug reporting: http://cygwin.com/bugs.html Documentation: http://cygwin.com/docs.html FAQ: http://cygwin.com/faq/

