once again - can someone answer my question instead of giving very
If I remember correctly, you edit /etc/ttys and set some of your ttyp* (i.e.
network ptys) to be 'SECURE'. It really isn't a good idea though. The reason
it works. but it is strange solution, as rshd and sshd can be set up this
why telnetd can't?
i tried allow_root in /etc/pam.d/telnetd every place (like with
/etc/pam/rsh) and it doesn't work.
something with ssh - you can allow ssh RootLogin, but not with passwords only
yes i already use PermitRootLogin in sshd_config and ssh root login works.
same with rshd by changing /etc/pam.d/rsh
but with telnet it does not.
very funny is reading other people's replies about security, showing that
they simply don't understand how things works.
i don't ask if telnetd can be sniffed, because i know it can. as well as
telnet when logging to non-root user, as well as rsh.
and if there were exploits for telnetd for SunOS or FreeBSD, they
exploited bugs in telnetd, and not guessing root password. so allowing
root login or not doesn't make any difference.
so generalizing that "telnet and rsh is bad" is as stupid as telling that
oxygen is bad as it makes fires.
email@example.com mailing list
To unsubscribe, send any mail to "[EMAIL PROTECTED]"