Commit Graph

5 Commits

Author SHA1 Message Date
Philippe Charnier
5f03edf130 Correctly operate on hardlink when source and destination are not on the same
device.
PR: bin/3158 (part 2)
1998-04-20 06:20:24 +00:00
Philippe Charnier
52e8a120a3 Prevent rdist from dumping core: do not free() pointer before using it.
Add rcsid. Document -D flag (debug mode). Remove unused includes.
PR:bin/3158 (part 1)
1998-04-06 06:18:32 +00:00
Peter Wemm
fb9e3ade6c Remove the need for rdist(1) to run setuid, thus completely closing any
possibility of a security hole.  It now does what rdist-6 does, and calls
/usr/bin/rsh if not running as root.  There are NO protocol changes, this
is 100% compatable with the old rdist, except that it does not need setuid
root privs.

However, there are some minor differences to the base rdist-6 code in that
if it is being run by root, it will call rcmd(3) directly rather than
piping everything through rsh(1).  This is a little more efficient as it
doesn't involve context switching on pipe reads/writes.

Also, the -P option was added from rdist-6.1.2, which allows an alternative
rsh program to be specified, such as ssh.  Note that it requires the fixes
to the ssh port to disable the unconditional USE_PIPES option that was
recently added.  The rcmd(3) optimisation is disabled if a non-rsh program
is speficied.
1996-08-10 07:54:17 +00:00
Nate Williams
746a432165 Changed all sprintf() calls to snprintf().
Obtained from:	Christos Zoulas <christos@deshaw.com> via NetBSD PR 2621,

[ slightly modified since we don't use libcompat anymore. ]

I'm not sure if this fixes the rdist security bug completely, but it
sure can't hurt!
1996-07-12 04:00:15 +00:00
Rodney W. Grimes
9b50d90275 BSD 4.4 Lite Usr.bin Sources 1994-05-27 12:33:43 +00:00