Handling disk full & No Kernel resources

Casey Schaufler casey at schaufler-ca.com
Fri Jan 7 00:07:15 UTC 2005


--- Klaus Weidner <klaus at atsec.com> wrote:


> Okay, in that case the users have been authenticated
> by the remote
> system first, and the second system extends trust
> based on this.

That is exactly correct.

> I had made the implicit assumption of independent
> administrative domains
> as was done in the previous Linux security targets,
> but there are of
> course other ways to define this. I would still
> consider passwordless rsh
> to be an abomination though ;-)

Even on a cluster?


=====
Casey Schaufler
casey at schaufler-ca.com


		
__________________________________ 
Do you Yahoo!? 
Read only the mail you want - Yahoo! Mail SpamGuard. 
http://promotions.yahoo.com/new_mail 




More information about the Linux-audit mailing list