From owner-freebsd-security Wed Feb 28 07:14:23 1996 Return-Path: owner-security Received: (from root@localhost) by freefall.freebsd.org (8.7.3/8.7.3) id HAA13632 for security-outgoing; Wed, 28 Feb 1996 07:14:23 -0800 (PST) Received: from zip.io.org (root@zip.io.org [198.133.36.80]) by freefall.freebsd.org (8.7.3/8.7.3) with SMTP id HAA13626 for ; Wed, 28 Feb 1996 07:14:20 -0800 (PST) Received: (from taob@localhost) by zip.io.org (8.6.12/8.6.12) id KAA06598; Wed, 28 Feb 1996 10:13:13 -0500 Date: Wed, 28 Feb 1996 10:13:13 -0500 (EST) From: Brian Tao To: Ollivier Robert cc: Denis Fortin , cschuber@orca.gov.bc.ca, freebsd-security@FreeBSD.ORG Subject: Re: Informing users of cracked passwords? In-Reply-To: <199602272259.XAA01043@keltia.freenix.fr> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-security@FreeBSD.ORG Precedence: bulk On Tue, 27 Feb 1996, Ollivier Robert wrote: > > > But anyway, I'd rather have people use telnet... I've always found the > > "r" commands to be too magical for my taste :-) > > The answer is called SSH. You need ssh running at both ends, don't you? -- Brian Tao (BT300, taob@io.org) Systems Administrator, Internex Online Inc. "Though this be madness, yet there is method in't"