[13039] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: OK.

daemon@ATHENA.MIT.EDU (Alan Hannan)
Sat Oct 25 13:30:29 1997

Date: Sat, 25 Oct 1997 12:50:15 -0400
From: Alan Hannan <hannan@bythetrees.com>
To: Alex Rubenstein <alex@nac.net>
Cc: nanog@merit.edu
In-Reply-To: <Pine.BSF.3.96.971024232528.15286C-100000@iago.nac.net>; from Alex Rubenstein on Fri, Oct 24, 1997 at 11:26:16PM -0400


  It's my opinion first and foremost that you are not a moron.

  Moreover, and keeping with the operational charter of the newsgroup, I 
  would not recommend that folks enable r* commands on their cisco
  routers.

  When automated access is required, automating access with stored
  passwords can be done quite handily.

  While one must focus on protecting the sanctity of the stored
  passwords, one doesn't have to focus on the security of forged r*
  logins.  Protecting something within a host, rather than a network
  segment, is probably simpler in this case than the converse.

  $0.02.

  Most web page access, odd-statistics gathering, and ease-of-use
  tools with which I am familiar use ^expect^ to implement such.

  -alan

Quoting Alex Rubenstein (alex@nac.net):
> 
> I am a moron; I can't figure it out.
> 
> How do you make a cisco so that you can rsh into it (to use Mr. Kerns
> looking glass)?
> 
> TIA>
> 
> 

home help back first fref pref prev next nref lref last post