[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]

Re: Handling disk full & No Kernel resources



--- Klaus Weidner <klaus atsec com> wrote:


> Okay, in that case the users have been authenticated
> by the remote
> system first, and the second system extends trust
> based on this.

That is exactly correct.

> I had made the implicit assumption of independent
> administrative domains
> as was done in the previous Linux security targets,
> but there are of
> course other ways to define this. I would still
> consider passwordless rsh
> to be an abomination though ;-)

Even on a cluster?


=====
Casey Schaufler
casey schaufler-ca com


		
__________________________________ 
Do you Yahoo!? 
Read only the mail you want - Yahoo! Mail SpamGuard. 
http://promotions.yahoo.com/new_mail 


[Date Prev][Date Next]   [Thread Prev][Thread Next]   [Thread Index] [Date Index] [Author Index]