Barry Margolin (firstname.lastname@example.org)
19 Mar 88 12:44:32 GMT
In article <In article <722@kaos.UUCP> In article <722@kaos.UUCP> romkey@kaos.UUCP (John Romkey) writes:
>"Trusted ports" (when port numbers less than 1024 can only be used by
>a trusted user) exist only in the world of the Berkeley UNIX TCP.
>Virtually no TCP/IP implementations that are not derived from BSD
>UNIX have the concept of "trusted ports"; they will allow any user
>program to open a connection on any port that isn't already in use.
This is why the Unix RSH server also checks the host against a .rhosts
file. Presumably you would only list machines that implement the
trusted port rule.
Thinking Machines Corp.
This archive was generated by hypermail 2.0b3 on Thu Mar 09 2000 - 14:41:31 GMT