From owner-freebsd-security Mon Feb 27 05:30:01 1995 Return-Path: security-owner Received: (from majordom@localhost) by freefall.cdrom.com (8.6.9/8.6.6) id FAA23239 for security-outgoing; Mon, 27 Feb 1995 05:30:01 -0800 Received: from kryten.atinc.com (kryten.atinc.com [198.138.38.7]) by freefall.cdrom.com (8.6.9/8.6.6) with ESMTP id FAA23210; Mon, 27 Feb 1995 05:27:47 -0800 Received: (jmb@localhost) by kryten.atinc.com (8.6.9/8.3) id IAA08020; Mon, 27 Feb 1995 08:23:15 -0500 Date: Mon, 27 Feb 1995 08:23:13 -0500 (EST) From: "Jonathan M. Bresler" Subject: Re: key exchange for rlogin/telnet services? To: Peter da Silva cc: "Jordan K. Hubbard" , hackers@freefall.cdrom.com, security@freefall.cdrom.com In-Reply-To: <199502262234.QAA11986@bonkers.taronga.com> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: security-owner@FreeBSD.org Precedence: bulk On Sun, 26 Feb 1995, Peter da Silva wrote: > A more complex answer is swIPe, which lets you run a complete encrypted IP > session on top of an IP channel. This requires you have at least a secure > site in the badguy's camp. like your laptop FreeBSD box. Jonathan M. Bresler jmb@kryten.atinc.com | Analysis & Technology, Inc. | 2341 Jeff Davis Hwy play go. | Arlington, VA 22202 ride bike. hack FreeBSD.--ah the good life | 703-418-2800 x346