K 10 svn:author V 3 pst K 8 svn:date V 27 1996-11-22T08:59:07.000000Z K 7 svn:log V 400 Back out recent security patch for rexecd. After more careful analysis, it is both uneeded and breaks certain lock-step timing in the rexec protocol. Yes, an attacker can "relay" connections using this trick, but a properly configured firewall that would make this sort of subterfuge necessary in the first place (instead of direct packet spoofing) would also thwart useful attacks based on this. END