Gary Winiger writes:
>  - Another way to do this would be to auto-detect Kerberos usage but
>    it was rejected as too radical a change for these remote apps that
>    have been in use for many years.

Can you expand on that?

What harm happens if the command "just works" in the presence of
Kerberos?  Or, rather, why does the user need to configure the system
manually in order to get it to do what it should have done in the
first place?

This doesn't look at all analogous to the telnet "-a" option to me.
That one is quite different because transferring the user name is
typically *not* part of the protocol -- where it *is* part of the
expected protocol for the r-commands.

-- 
James Carlson, Solaris Networking              <james.d.carlson at sun.com>
Sun Microsystems / 35 Network Drive        71.232W   Vox +1 781 442 2084
MS UBUR02-212 / Burlington MA 01803-2757   42.496N   Fax +1 781 442 1677

Reply via email to