In the client, construct a checksum from the command line
authorSam Hartman <hartmans@mit.edu>
Sat, 20 Jan 1996 00:55:45 +0000 (00:55 +0000)
committerSam Hartman <hartmans@mit.edu>
Sat, 20 Jan 1996 00:55:45 +0000 (00:55 +0000)
commitc5f77d7f244dda724d9c3f4b68973e0aa3fb6de1
tree91c230f34b81410ce714b836bc8a9603d1f78c4a
parent358ec4a75edfa70ae585dc53b18db3767f732f8e
In the client, construct a checksum from the command line
and remote user and encode them in the authenticator.  In the daemon,
if a checksum is present, verify it.

This change *should* make it possible to use rsh in a secure
fassion provided  that you always use a client that has
checksumming.

If you do not use encrypted rsh, then the command line cannot be
spoofed,
but the standard input and output  can still be spoofed.

git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@7341 dc483132-0cff-0310-8789-dd5450dbe970
src/appl/bsd/ChangeLog
src/appl/bsd/kcmd.c
src/appl/bsd/krshd.c