Sort sections.

This commit is contained in:
wiz 2002-01-15 02:24:28 +00:00
parent 02dda53455
commit 110806f773
2 changed files with 12 additions and 12 deletions

View File

@ -1,4 +1,4 @@
.\" $NetBSD: rexecd.8,v 1.7 1999/03/22 18:25:45 garbled Exp $ .\" $NetBSD: rexecd.8,v 1.8 2002/01/15 02:24:28 wiz Exp $
.\" .\"
.\" Copyright (c) 1983, 1991, 1993 .\" Copyright (c) 1983, 1991, 1993
.\" The Regents of the University of California. All rights reserved. .\" The Regents of the University of California. All rights reserved.
@ -133,6 +133,11 @@ and is not preceded by a flag byte.
.El .El
.Sh SEE ALSO .Sh SEE ALSO
.Xr rexec 3 .Xr rexec 3
.Sh HISTORY
The
.Nm
command appeared in
.Bx 4.2 .
.Sh BUGS .Sh BUGS
Indicating ``Login incorrect'' as opposed to ``Password incorrect'' Indicating ``Login incorrect'' as opposed to ``Password incorrect''
is a security breach which allows people to probe a system for users is a security breach which allows people to probe a system for users
@ -140,11 +145,6 @@ with null passwords.
.Pp .Pp
A facility to allow all data and password exchanges to be encrypted should be A facility to allow all data and password exchanges to be encrypted should be
present. present.
.Sh HISTORY
The
.Nm
command appeared in
.Bx 4.2 .
.Sh SECURITY CONSIDERATIONS .Sh SECURITY CONSIDERATIONS
As the passwords exchanged by the client and As the passwords exchanged by the client and
.Nm .Nm

View File

@ -1,4 +1,4 @@
.\" $NetBSD: rlogind.8,v 1.12 2001/04/04 09:56:31 wiz Exp $ .\" $NetBSD: rlogind.8,v 1.13 2002/01/15 02:24:42 wiz Exp $
.\" .\"
.\" Copyright (c) 1983, 1989, 1991, 1993 .\" Copyright (c) 1983, 1989, 1991, 1993
.\" The Regents of the University of California. All rights reserved. .\" The Regents of the University of California. All rights reserved.
@ -168,6 +168,11 @@ by the server failed.
.Xr ruserok 3 , .Xr ruserok 3 ,
.Xr ttyaction 3 , .Xr ttyaction 3 ,
.Xr rshd 8 .Xr rshd 8
.Sh HISTORY
The
.Nm
command appeared in
.Bx 4.2 .
.Sh BUGS .Sh BUGS
The authentication procedure used here assumes the integrity The authentication procedure used here assumes the integrity
of each client machine and the connecting medium. of each client machine and the connecting medium.
@ -190,8 +195,3 @@ on top of
socket, not socket, not
.Dv AF_INET6 .Dv AF_INET6
socket. socket.
.Sh HISTORY
The
.Nm
command appeared in
.Bx 4.2 .