Unix Trust
¨
Authenticating users on behalf of another machine
¨
R-commands
–
rlogin
–
rsh
–
rcp
¨
Weakness of r-commands
–
Actions based on IP address of trusted machine
–
Undermining r-commands via IP address spoofing