On Fri, Aug 31, 2007 at 02:12:03PM -0500, Decibel! wrote: > ISTM that if someone breaches your network to the point where they can > spoof identd, you're pretty much hosed anyway; so what's the point of > hard-coding passwords in a config file somewhere then?
True. I personally prefer cryptographic authentication for this reason (but it's not perfect either -- if someone has root, they have root. You're hosed). None of my employers ever seem willing to pay the additional overhead, however. A -- Andrew Sullivan | [EMAIL PROTECTED] The plural of anecdote is not data. --Roger Brinner ---------------------------(end of broadcast)--------------------------- TIP 6: explain analyze is your friend