From owner-freebsd-questions Mon May 17 12:31:28 1999 Delivered-To: freebsd-questions@freebsd.org Received: from resnet.uoregon.edu (resnet.uoregon.edu [128.223.144.32]) by hub.freebsd.org (Postfix) with ESMTP id A0B9C14CD0 for ; Mon, 17 May 1999 12:31:26 -0700 (PDT) (envelope-from dwhite@resnet.uoregon.edu) Received: from localhost (dwhite@localhost) by resnet.uoregon.edu (8.8.8/8.8.8) with ESMTP id MAA14019; Mon, 17 May 1999 12:31:22 -0700 (PDT) (envelope-from dwhite@resnet.uoregon.edu) Date: Mon, 17 May 1999 12:31:21 -0700 (PDT) From: Doug White To: goodguy@fiberia.com Cc: freebsd-questions@FreeBSD.ORG Subject: Re: How to implement S/Key In-Reply-To: <199905141002.DAA01850@mail.fiberia.com> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-questions@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG On Fri, 14 May 1999 goodguy@fiberia.com wrote: > I read Chapter 6 Security of FreeBSD Handbook and I'm > interested in implementing S/Key on my system which is recently > being hacked every day.How do I implement S/Key like on > chapter 6 ?.Help Please. `man keyinit' and 'man skey' are a good start. Doug White Internet: dwhite@resnet.uoregon.edu | FreeBSD: The Power to Serve http://gladstone.uoregon.edu/~dwhite | www.freebsd.org To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-questions" in the body of the message