I think, rsh is quite obsolete

Krzysztof Halasa khc at pm.waw.pl
Tue Nov 14 15:32:47 UTC 2006


Dave Mitchell <davem at iabyn.com> writes:

>> Just as with NFS for example. Is NFS evil too?
>
> Basic NFS is pretty evil. Totally insecure.

Well, it looks like most local traffic here uses evil things :-)
I imagine TFTP isn't less evil and perhaps only FTP is worse
(cleartext passwords over the wire and firewall problems). And
Samba (especially with unencrypted passwords) and X and...

> The rsh protocol requires the server to make a second TCP connection back
> to a low-numbered ephemeral port specified by the client, for the stderr
> channel.

Nope, that's optional.

> If you haven't got a stateful, inspecting firewall, you're hosed.

Even with stderr all you'd need is a simple helper.

Anyway most people use rsh* over physically secure networks.
Password-less privileged access with source IP access control over
public network? No, thanks.
-- 
Krzysztof Halasa




More information about the fedora-devel-list mailing list