From owner-freebsd-questions Sat Oct 4 18:59:16 1997 Return-Path: Received: (from root@localhost) by hub.freebsd.org (8.8.7/8.8.7) id SAA19111 for questions-outgoing; Sat, 4 Oct 1997 18:59:16 -0700 (PDT) Received: from milehigh.denver.net (milehigh.denver.net [204.144.180.2]) by hub.freebsd.org (8.8.7/8.8.7) with ESMTP id SAA19106 for ; Sat, 4 Oct 1997 18:59:14 -0700 (PDT) Received: (from jdc@localhost) by milehigh.denver.net (8.8.5/8.8.5) id TAA03557; Sat, 4 Oct 1997 19:59:52 -0600 (MDT) Message-ID: <19971004195951.62720@denver.net> Date: Sat, 4 Oct 1997 19:59:51 -0600 From: John-David Childs To: chip@jlc.net Cc: freebsd-questions@freebsd.org Subject: Re: S/Key and popper References: <19971004184537.15202@verdi.jlc.net> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii X-Mailer: Mutt 0.79 In-Reply-To: <19971004184537.15202@verdi.jlc.net>; from Chip Marshall on Sat, Oct 04, 1997 at 06:45:37PM -0400 Organization: Enterprise Internet Solutions Sender: owner-freebsd-questions@freebsd.org X-Loop: FreeBSD.org Precedence: bulk On Saturday October 4, 1997, Chip Marshall had this to say about "S/Key and popper": > I work for an ISP, and we are trying to tighten our security a bit. > For our mail server, we are restricting access to telnetd using > tcp_wrappers, but would also like to force S/Key instead of normal > passwords. However, our customers mostly check their mail using > standard passwords and know nothing of S/Key. I was wondering how > to go about permiting normal passwords from popper, but not any > other service (telnetd and such.) Can anyone help me? The problem with this is that lusers often use the same password for mail and telnet/ftp/web/etc.. If one is unencrypted and sniffable, why waste time on the others (at least as far as S/Key, Kerberos, etc). -- John-David Childs (JC612) Enterprise Internet Solutions System Administrator @denver.net/Internet-Coach/@ronan.net & Network Engineer 1031 S. Parker Rd. #I-8 Denver, CO 80231 As of this^H^H^H^H next week, passwords will be entered in Morse code.