cristy@eplrx7.uucp (John Cristy) (03/21/91)
I have read that the use of rlogin & rsh is discourgaged due to its lack of user authentication but the same concerns do not apply to telnet. Suppose that you remove the /.rhosts and /etc/hosts.equiv file, and assure that all user .rhosts contain a system name and user name on each line. Given those conditions, isn't rlogin, rsh, and telnet all at the same level of security exposure (password level security). Or are there still risks associated with rlogin & rsh that are not associated with telnet? Please Email your replies. Thanks in advance. -- The UUCP Mailer