once again - can someone answer my question instead of giving very "intelligent" comments?
If I remember correctly, you edit /etc/ttys and set some of your ttyp* (i.e. network ptys) to be 'SECURE'. It really isn't a good idea though. The reason

it works. but it is strange solution, as rshd and sshd can be set up this way.

why telnetd can't?

i tried allow_root in /etc/pam.d/telnetd every place (like with /etc/pam/rsh) and it doesn't work.

something with ssh - you can allow ssh RootLogin, but not with passwords only

yes i already use PermitRootLogin in sshd_config and ssh root login works. same with rshd by changing /etc/pam.d/rsh

but with telnet it does not.

very funny is reading other people's replies about security, showing that they simply don't understand how things works.

i don't ask if telnetd can be sniffed, because i know it can. as well as telnet when logging to non-root user, as well as rsh.

and if there were exploits for telnetd for SunOS or FreeBSD, they exploited bugs in telnetd, and not guessing root password. so allowing root login or not doesn't make any difference.

so generalizing that "telnet and rsh is bad" is as stupid as telling that oxygen is bad as it makes fires.
freebsd-questions@freebsd.org mailing list
To unsubscribe, send any mail to "[EMAIL PROTECTED]"

Reply via email to