1fffa1ab7f
it is both uneeded and breaks certain lock-step timing in the rexec protocol. Yes, an attacker can "relay" connections using this trick, but a properly configured firewall that would make this sort of subterfuge necessary in the first place (instead of direct packet spoofing) would also thwart useful attacks based on this. |
||
---|---|---|
.. | ||
Makefile | ||
rexecd.8 | ||
rexecd.c |