First page Back Continue Last page Summary Graphics
Case Study: rcp and rdist
rcp and rdist use the rsh protocol.
The rsh protocol requires that the client program be on a privileged port.
Thus, rcp and rdist run as root.
Both have a long history of security holes