Re: rcp root-to-root

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Thu, Jan 15, 2004 at 02:15:18PM -0500, Brian T. Brunner wrote:
> Embedded application, runs as root, no local users,
> 
> Information needed: what files & settings therein prevent
> root-to-root rcp.

Modify /etc/hosts.equiv or the target system's superuser's ~/.rhosts
file to list the client server and user.  Modify /etc/pam.d/rsh, adding
"promiscuous" to the set of options passed to the pam_rhosts_auth.so
module.  Add "rsh" to the list of ttys in /etc/securetty. [1]  Enable
the server by running "chkconfig rsh on".  Adjust any firewall the
server has.

HTH,

Nalin

[1] The rsh server doesn't allocate a tty because the protocol doesn't
    use one, so it sets the tty to "rsh" for pam_securetty's benefit.


-- 
Shrike-list mailing list
Shrike-list@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/shrike-list

[Index of Archives]     [Fedora Users]     [Centos Users]     [Kernel Development]     [Red Hat Install]     [Red Hat Watch]     [Red Hat Development]     [Red Hat Phoebe Beta]     [Yosemite Forum]     [Fedora Discussion]     [Gimp]     [Stuff]     [Yosemite News]

  Powered by Linux