To what mail are you responding? What's you're suggesting here sounds  
an awful lot like the wrong answer to virtually any question: it's  
preferable not to use Berkeley remote execution facilities at all,  
preferring either Kerberised equivalents or ssh, or gluing together  
your own daemons to get a more granular security model than generic  
remote execution allows.

Trusting the world and turning on insecure services is a good way to  
get pwned by script kiddies from the Internet or within, so I'm  
curious to what question would warrant this reply?

Am 17 Dec 2009 um 02:38 schrieb xhawk:

> What version is your opensolaris?
>
> The trick is that because opensolaris is somewhat different from  
> solaris.
> the default home of root in opensolaris is"/root", not "/".
>
> so the file .rhosts should be put in /root.
>
> By the way, you do not need the /etc/hosts.equiv in solaris 10 and  
> opensolaris 11.
>
> and the .rhosts format can be as simple as only a "+" :
>
> #echo "+">/root/.rhosts
>
> make sure the following services are enabled:
> svc:/network/login:rlogin
> svc:/network/shell:default
>
> IF not, enable them:
> svcadm enable svc:/network/login:rlogin
> svcadm enable svc:/network/shell:default
> -- 
> This message posted from opensolaris.org
> _______________________________________________
> security-discuss mailing list
> security-discuss at opensolaris.org

Reply via email to