On Fri, Aug 31, 2007 at 02:12:03PM -0500, Decibel! wrote:
> ISTM that if someone breaches your network to the point where they can
> spoof identd, you're pretty much hosed anyway; so what's the point of
> hard-coding passwords in a config file somewhere then?

True.  I personally prefer cryptographic authentication for this
reason (but it's not perfect either -- if someone has root, they have
root.  You're hosed).  None of my employers ever seem willing to pay
the additional overhead, however.

Andrew Sullivan  | [EMAIL PROTECTED]
The plural of anecdote is not data.
                --Roger Brinner

---------------------------(end of broadcast)---------------------------
TIP 6: explain analyze is your friend

Reply via email to