From owner-freebsd-questions Sat Oct 4 15:45:37 1997 Return-Path: Received: (from root@localhost) by hub.freebsd.org (8.8.7/8.8.7) id PAA11195 for questions-outgoing; Sat, 4 Oct 1997 15:45:37 -0700 (PDT) Received: from verdi.jlc.net (verdi.jlc.net [199.201.159.1]) by hub.freebsd.org (8.8.7/8.8.7) with ESMTP id PAA11189 for ; Sat, 4 Oct 1997 15:45:32 -0700 (PDT) Received: (from chip@localhost) by verdi.jlc.net (8.8.5/8.6.9) id SAA20173; Sat, 4 Oct 1997 18:45:37 -0400 (EDT) Message-ID: <19971004184537.15202@verdi.jlc.net> Date: Sat, 4 Oct 1997 18:45:37 -0400 From: Chip Marshall To: FreeBSD Questions Subject: S/Key and popper Reply-To: chip@jlc.net Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii X-Mailer: Mutt 0.76 Sender: owner-freebsd-questions@FreeBSD.ORG X-Loop: FreeBSD.org Precedence: bulk I work for an ISP, and we are trying to tighten our security a bit. For our mail server, we are restricting access to telnetd using tcp_wrappers, but would also like to force S/Key instead of normal passwords. However, our customers mostly check their mail using standard passwords and know nothing of S/Key. I was wondering how to go about permiting normal passwords from popper, but not any other service (telnetd and such.) Can anyone help me? -- Chip Marshall http://www.jlc.net/~chip/ InterNIC handle - CLM21 Key fingerprint = BA B1 8E 14 60 C6 10 32 18 24 C6 F1 D5 CC 80 52