Solutions
6
Don’t implement the protocol directly in rcp and rdist; invoke the rsh command.
Or invoke a small, trusted program that sets up the connection and passes back an open file descriptor.
Best of all, use a real authentication mechanism.
Previous slide
Next slide
Back to first slide
View graphic version