[27] in bugtraq

home help back first fref pref prev next nref lref last post

Re: Internet Worm

daemon@ATHENA.MIT.EDU (Perry E. Metzger)
Tue Oct 18 13:48:52 1994

To: Scott Schwartz <schwartz@galapagos.cse.psu.edu>
Cc: bugtraq@fc.net
In-Reply-To: Your message of "Tue, 18 Oct 1994 11:02:13 EDT."
             <94Oct18.110218edt.12690@galapagos.cse.psu.edu> 
Reply-To: perry@imsi.com
Date: Tue, 18 Oct 1994 11:05:49 -0400
From: "Perry E. Metzger" <perry@imsi.com>


Scott Schwartz says:
> 
> | Wrong. Dangerously wrong. If you tried building some non-sun library
> | code on your system, your berkeley r commands might suddenly work
> | wrong. Sun did lots of monkeying with the relationship between the yp
> | library, the resolver library, and the r-commands.
> 
> The kerberos versions of the r-cmds seem to work ok (and, apropos the
> origin of this thread, they address the authentication issue in a
> better way).  Anyone know if Perry's comments pertain to them?

They use a different authentication scheme, so no, the comments aren't
relevant.

Perry

home help back first fref pref prev next nref lref last post