####################
# pablo
system pablo
...
forward uchile
####################
# uchile
system uchile
...
forward-to pablo
The
To permit forwarding to any system, use the special keyword
Setting Up Your System for Dialing In
If you want to set up your site for dialing in, you have to permit logins on your serial port and customize some system files to provide UUCP accounts, which we will cover in this section.
Providing UUCP Accounts
To begin with, you have to set up user accounts that let remote sites log into your system and establish a UUCP connection. Generally, you will provide a separate login name to each system that polls you. When setting up an account for system
For systems that dial in through the serial port, you usually have to add these accounts to the system password file
To serve UUCP systems that connect to your site over TCP, you have to set up inetd to handle incoming connections on the
uucp stream tcp nowait root /usr/sbin/tcpd /usr/lib/uucp/uucico -l
The
Upablo IslaNegra
Ulorca co'rdoba
This file must be owned by
Does this database sound like such a good idea that you would like to use it on normal serial logins, too? Well, in some cases you can. What you need is a getty program that you can tell to invoke uucico instead of /bin/login for your UUCP users.[102] The invocation of uucico would look like this:
/usr/lib/uucp/uucico -l -u
The
To protect your UUCP users from callers who might give a false system name and snarf all their mail, you should add called-login commands to each system entry in the
Protecting Yourself Against Swindlers
A major problem with UUCP is that the calling system can lie about its name; it announces its name to the called system after logging in, but the server doesn't have any way to check it. Thus, an attacker could log into his or her own UUCP account, pretend to be someone else, and pick up that other site's mail. This is particularly troublesome if you offer login via anonymous UUCP, where the password is made public.
You
system pablo
... usual options ...
called-login Upablo
The upshot is that whenever a system logs in and pretends it is
Be Paranoid: Call Sequence Checks
Another way to fend off and detect impostors is to use call sequence checks. These help you protect against intruders who somehow manage to find out the password with which you log into your UUCP system.
When using call sequence checks, both machines keep track of the number of connections established so far. The counter is incremented with each connection. After logging in, the caller sends its call sequence number, and the receiver checks it against its own number. If they don't match, the connection attempt is rejected. If the initial number is chosen at random, attackers will have a hard time guessing the correct call sequence number.
But call sequence checks do more for you. Even if some very clever person should detect your call sequence number as well as your password, you will find out. When the attacker calls your UUCP feed and steals your mail, this will increase the feeds call sequence number by one. The next time
