On Fri, Aug 11, 2000 at 01:38:52AM -0400, Greg A. Woods wrote:
> What's wrong with that is that you still have almost zero
> accountability.  Under cvspserver anyone can be anyone with only a very
> few tricks up their sleeves.  That simply cannot possibly ever happen
> with SSH.

Wrong again. When pserver is authenticating with real Unix uid's there is
no way for someone to fool CVS into changing their UID. CVS can't do it.

> > > But the real culprit gets away.  This wouldn't happen with SSH.
> > 
> > The culprit gets away no matter what. There's nothing I can do to
> > them even if I find out which email address is really associated
> > with the attack.
> 
> No, with SSH the culprit cannot "get away".  You've got a finger
> pointing right at them, and a mound of evidence to show what they did,
> when, and how.  I.e. you have a counter-threat, and possibly one that's
> far more powerful than the threat they posed to you earlier.

OK, so I know that "[EMAIL PROTECTED]" has broken into my box. Do I 
know that this person is really you? Or are they someone pretending to 
be you? And what do I do about it?

Since the answer is I have no idea who they are and there's not a damn 
thing I can do about it I don't see your point at all.

All I know is which password to disable. And I knew that with the pserver
solution as well. So what's the difference? 

Justin

Reply via email to