BNU files with direct connection in the remote system files
These files contain telephone connection entries on the
remote system hera
.
- Systems file: The Systems file on
system
hera
contains the following entry for systemzeus
:zeus Any zeus 1200 - "" \r\d\r\d\r in:--in: uhera word: portent
This entry specifies that system
hera
can log in to systemzeus
at any time, by using a direct connection, which is specified in the Devices files. To find the entry in the Devices files, BNU uses the third and fourth fields of the Systems entry. Thus, BNU looks for an entry in the Devices files with the Type field of valuezeus
and a Class field of value1200
. Systemhera
logs in to systemzeus
as useruhera
with the passwordportent
. - Devices file: The Devices file on
system
hera
contains the following entry for communications with the systemzeus
:zeus tty1 - 1200 direct
This entry specifies that system
hera
uses devicetty1
at1200
bps to communicate with systemzeus
. Because the Dialer is specified asdirect
, BNU checks the Dialers files for adirect
entry. - Dialers file: The Dialers file on
system
hera
contains the following entry for direct connections:direct
This entry specifies that no dialer configuration is required on the direct connection.
- Permissions file: The Permissions file
on system
hera
contains the following entries, which specify the ways in whichzeus
can conduct uucico and uuxqt transactions with systemhera
:LOGNAME=uzeus REQUEST=yes SENDFILES=yes READ=/ WRITE=/ MACHINE=hera:zeus VALIDATE=uzeus REQUEST=yes COMMANDS=ALL READ=/\ WRITE=/
These entries specify that system
zeus
logs in to systemhera
asuzeus
. Because theVALIDATE=uzeus
parameter is included, systemzeus
cannot log in to systemhera
with any other login ID, nor can any other remote system use theuzeus
ID. Systemzeus
can read and write to any directory on systemhera
, and can send and request files regardless of who initiated the call. Systemzeus
can also initiate any commands on systemhera
.Attention: If you provide all the permissions in the preceding example, it is equivalent to giving any user on the remote system a login ID on the local system. Such liberal permissions can jeopardize your security and are given only to remote systems at the same site.