From owner-cvs-all Wed Sep 23 23:44:43 1998 Return-Path: Received: (from daemon@localhost) by hub.freebsd.org (8.8.8/8.8.8) id XAA10742 for cvs-all-outgoing; Wed, 23 Sep 1998 23:44:43 -0700 (PDT) (envelope-from owner-cvs-all) Received: from word.smith.net.au (castles184.castles.com [208.214.165.184]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id XAA10711 for ; Wed, 23 Sep 1998 23:44:31 -0700 (PDT) (envelope-from mike@word.smith.net.au) Received: from word.smith.net.au (localhost [127.0.0.1]) by word.smith.net.au (8.9.1/8.8.8) with ESMTP id XAA00509; Wed, 23 Sep 1998 23:50:02 -0700 (PDT) (envelope-from mike@word.smith.net.au) Message-Id: <199809240650.XAA00509@word.smith.net.au> X-Mailer: exmh version 2.0.2 2/24/98 To: Ollivier Robert cc: committers@FreeBSD.org Subject: Re: Security and other facilities at WC CDROM - the plan. In-reply-to: Your message of "Thu, 24 Sep 1998 08:08:21 +0200." <19980924080821.A3252@keltia.freenix.fr> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Date: Wed, 23 Sep 1998 23:50:01 -0700 From: Mike Smith Sender: owner-cvs-all@FreeBSD.org X-Loop: FreeBSD.org Precedence: bulk > According to Jacques Vidrine: > > I expect that Kerberos will be used for password authentication, > > thus there is no need to have the password in the NIS maps. > > Not everyone is in the US or able to use Kerberos... So use ssh. We are providing a range of options covering all of the bases. ssh may use Krb to obtain the password from the authentication server without you even noticing. -- \\ Sometimes you're ahead, \\ Mike Smith \\ sometimes you're behind. \\ mike@smith.net.au \\ The race is long, and in the \\ msmith@freebsd.org \\ end it's only with yourself. \\ msmith@cdrom.com