--- Klaus Weidner <klaus(a)atsec.com> wrote:
 Okay, in that case the users have been authenticated
 by the remote
 system first, and the second system extends trust
 based on this. 
That is exactly correct.
 I had made the implicit assumption of independent
 administrative domains
 as was done in the previous Linux security targets,
 but there are of
 course other ways to define this. I would still
 consider passwordless rsh
 to be an abomination though ;-) 
Even on a cluster?
=====
Casey Schaufler
casey(a)schaufler-ca.com
		
__________________________________ 
Do you Yahoo!? 
Read only the mail you want - Yahoo! Mail SpamGuard. 
http://promotions.yahoo.com/new_mail