From Meyser@xenet.de  Mon Aug 14 01:02:47 2000
Return-Path: <Meyser@xenet.de>
Received: from xenet.harz.de. (xenet.harz.de [193.159.181.111])
	by hub.freebsd.org (Postfix) with ESMTP id ECA2D37BD67
	for <FreeBSD-gnats-submit@freebsd.org>; Mon, 14 Aug 2000 01:02:40 -0700 (PDT)
	(envelope-from Meyser@xenet.de)
Received: (from matthias@localhost)
	by xenet.harz.de. (8.9.3/8.9.3) id KAA83823;
	Mon, 14 Aug 2000 10:02:48 +0200 (CEST)
	(envelope-from matthias)
Message-Id: <200008140802.KAA83823@xenet.harz.de.>
Date: Mon, 14 Aug 2000 10:02:48 +0200 (CEST)
From: matthias@harz.de
Sender: Meyser@xenet.de
Reply-To: matthias@harz.de
To: FreeBSD-gnats-submit@freebsd.org
Subject: rsh / rshd brocken in 4.1-Stable from 3.8.2000
X-Send-Pr-Version: 3.2

>Number:         20590
>Category:       bin
>Synopsis:       rsh / rshd brocken
>Confidential:   no
>Severity:       serious
>Priority:       medium
>Responsible:    freebsd-bugs
>State:          closed
>Quarter:        
>Keywords:       
>Date-Required:  
>Class:          sw-bug
>Submitter-Id:   current-users
>Arrival-Date:   Mon Aug 14 01:10:02 PDT 2000
>Closed-Date:    Wed Aug 16 08:00:49 PDT 2000
>Last-Modified:  Wed Aug 16 08:02:16 PDT 2000
>Originator:     Matthias Meyser
>Release:        FreeBSD 4.1-STABLE i386
>Organization:
XeNET GmbH 
>Environment:

		2 machines with 4.1-STABLE 1.8.2000

>Description:

		Trying to configure rsh/rsh to do an
		"rsh machine ls" als root. 
		
		Configured ".rhosts". After getting some "permission denied"
		firgured out that I had to configure "pam.conf" altough.

		In "pam.conf" I just coppied all "login" lines and changed
                it to "rshd", commented out the original rshd entry.
		(why is ist disbaled by default ? )

		Now when I do an "rsh machine1 ls" from machine2 I get
		"assword:" as answer. At this Point I can enter enter any
		password I like even the right one but no will succed.
		Only way to exit is to press CTRL-C.

>How-To-Repeat:

		Just try to configure rsh

>Fix:



>Release-Note:
>Audit-Trail:
Responsible-Changed-From-To: gnats-admin->freebsd-bugs 
Responsible-Changed-By: jedgar 
Responsible-Changed-When: Wed Aug 16 04:45:52 PDT 2000 
Responsible-Changed-Why:  
Misfiled PR 

http://www.freebsd.org/cgi/query-pr.cgi?pr=20590 
State-Changed-From-To: open->feedback 
State-Changed-By: sheldonh 
State-Changed-When: Wed Aug 16 06:42:58 PDT 2000 
State-Changed-Why:  
I can't reproduce the problem on the development branch of 
FreeBSD. 

Could you confirm that the following configuration exhibits 
the problem? 

> /etc/inetd.conf: 
shell   stream  tcp     nowait  root    /usr/libexec/rshd       rshd 

> /etc/hosts.allow: 
rshd: 127.0.0.1 : ALLOW 

> /etc/pam.conf: 
# all other rshd-related entries removed and replaced with... 
rshd    auth    required        pam_permit.so 

> /root/.rhosts: 
127.0.0.1 

> On the command-line: 
kill -HUP `cat /var/run/inetd.pid` 
rsh 127.0.0.1 ls 

This works fine here, and I'm pretty sure you've just got a mangled 
pam.conf.  I'll spare you the lecture about the insecurity of 
rsh when compared with ssh. ;-) 

http://www.freebsd.org/cgi/query-pr.cgi?pr=20590 
State-Changed-From-To: feedback->closed 
State-Changed-By: sheldonh 
State-Changed-When: Wed Aug 16 08:00:49 PDT 2000 
State-Changed-Why:  
Turns out that it was, in fact, the pam.conf configuration. 

http://www.freebsd.org/cgi/query-pr.cgi?pr=20590 
>Unformatted:
