in reply to Re^5: Windows Service Pack Information
in thread Windows Service Pack Information
Erm . . .
However, the Ftp, and Rexec connectivity tools all rely on cleartext password authentication by the remote computer. Cleartext passwords are not encrypted before being sent over the network. This enables another user equipped with a network analyzer on the same network to steal a user's remote account password.
And reading what I presume to be the rshsvc docs says that it depends on the same "if it looks like the right host come on in" access checks that the original forms provide. Once you let one user in passwordless through a .rhosts you've put a screen door that anyone that can spoof traffic can open.
It's a network hygiene thing; 99.9% of the time it may be find that you leave your car unlocked because you park in a private deck, but by refusing to take a trivial step (getting in the habit of locking your car; installing something that's not an open vulnerability waiting to happen) you've only got yourself to blame that one time when a miscreant makes it past the other layers.
Live dangerously if you like, just be careful cavalierly advising others to do the same without letting them know there's risks involved. That's all.
The cake is a lie.
The cake is a lie.
The cake is a lie.
|
|---|
| Replies are listed 'Best First'. | |
|---|---|
|
Re^7: Windows Service Pack Information
by BrowserUk (Patriarch) on Apr 17, 2008 at 23:27 UTC | |
by Fletch (Bishop) on Apr 18, 2008 at 03:06 UTC | |
by BrowserUk (Patriarch) on Apr 18, 2008 at 03:50 UTC |