Bayard Bell wrote:
> To what mail are you responding? What's you're suggesting here sounds an
> awful lot like the wrong answer to virtually any question: it's
> preferable not to use Berkeley remote execution facilities at all,
> preferring either Kerberised equivalents or ssh, or gluing together your
> own daemons to get a more granular security model than generic remote
> execution allows.
> 
> Trusting the world and turning on insecure services is a good way to get
> pwned by script kiddies from the Internet or within, so I'm curious to
> what question would warrant this reply?


Agree - the below suggestion is wrong for almost all situations.  It is
horribly insecure, opening up root access to your system with no authentication
at all is a recipe for disaster.  

Use ssh and setup shared keys if you need automated remote access.

-Wyllys



> 
> Am 17 Dec 2009 um 02:38 schrieb xhawk:
> 
>> What version is your opensolaris?
>>
>> The trick is that because opensolaris is somewhat different from solaris.
>> the default home of root in opensolaris is"/root", not "/".
>>
>> so the file .rhosts should be put in /root.
>>
>> By the way, you do not need the /etc/hosts.equiv in solaris 10 and
>> opensolaris 11.
>>
>> and the .rhosts format can be as simple as only a "+" :
>>
>> #echo "+">/root/.rhosts
>>
>> make sure the following services are enabled:
>> svc:/network/login:rlogin
>> svc:/network/shell:default
>>
>> IF not, enable them:
>> svcadm enable svc:/network/login:rlogin
>> svcadm enable svc:/network/shell:default
>> -- 
>> This message posted from opensolaris.org
>> _______________________________________________
>> security-discuss mailing list
>> security-discuss at opensolaris.org
> 
> _______________________________________________
> security-discuss mailing list
> security-discuss at opensolaris.org

Reply via email to