Handling disk full & No Kernel resources
Casey Schaufler
casey at schaufler-ca.com
Fri Jan 7 00:07:15 UTC 2005
--- Klaus Weidner <klaus at atsec.com> wrote:
> Okay, in that case the users have been authenticated
> by the remote
> system first, and the second system extends trust
> based on this.
That is exactly correct.
> I had made the implicit assumption of independent
> administrative domains
> as was done in the previous Linux security targets,
> but there are of
> course other ways to define this. I would still
> consider passwordless rsh
> to be an abomination though ;-)
Even on a cluster?
=====
Casey Schaufler
casey at schaufler-ca.com
__________________________________
Do you Yahoo!?
Read only the mail you want - Yahoo! Mail SpamGuard.
http://promotions.yahoo.com/new_mail
More information about the Linux-audit
mailing list