> I would suggest you and your users just learn to use SSH and forget
> about trying to implement any security software yourself.  If you
> already have real unix user-ids for every real user then you're most of
> the way to making it work properly -- why not go all the way?

        I'm intrigued. If you feel so strongly about eradicating 
pserver, then help those who wish to understand why. Have you written
a HOWTO that explains how to set up read-only anonymous ssh access as
well as authenticated ssh access without providing shells to those 
authenticated users, and without having to create valid user accounts
on the server to handle them? What about the proper permissions 
necessary as well as groups and ownership of the various control 
files that CVS relies on? 

        Where might I find your informative writeup on this?
_______________________________________________
Info-cvs mailing list
[EMAIL PROTECTED]
http://mail.gnu.org/mailman/listinfo/info-cvs

Reply via email to