--- Klaus Weidner <klaus(a)atsec.com> wrote:
Okay, in that case the users have been authenticated
by the remote
system first, and the second system extends trust
based on this.
That is exactly correct.
I had made the implicit assumption of independent
administrative domains
as was done in the previous Linux security targets,
but there are of
course other ways to define this. I would still
consider passwordless rsh
to be an abomination though ;-)
Even on a cluster?
=====
Casey Schaufler
casey(a)schaufler-ca.com
__________________________________
Do you Yahoo!?
Read only the mail you want - Yahoo! Mail SpamGuard.
http://promotions.yahoo.com/new_mail