Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 26 Feb 1995 16:34:31 -0600
From:      Peter da Silva <peter@bonkers.taronga.com>
To:        "Jordan K. Hubbard" <jkh@freefall.cdrom.com>
Cc:        hackers@freefall.cdrom.com, security@freefall.cdrom.com
Subject:   Re: key exchange for rlogin/telnet services? 
Message-ID:  <199502262234.QAA11986@bonkers.taronga.com>
In-Reply-To: Your message of "Sun, 26 Feb 95 11:13:06 PST." <199502261913.LAA29658@freefall.cdrom.com> 

index | next in thread | previous in thread | raw e-mail

One half-baked answer. First, get SecureKey. The version I use, Hobbit's, is
sitting on NMTI's anonymous FTP server smokey.neosoft.com in source, Alpha/OSF
executable, and DOS executable. I'll ftp it over to freefall Mondey. It uses
a challenge string/encrypted challenge response method to keep from passing
passwords out to everyone. You don't get an encrypted session, but you don't
need any special software or arrangements at the other end.

A more complex answer is swIPe, which lets you run a complete encrypted IP
session on top of an IP channel. This requires you have at least a secure
site in the badguy's camp.


help

Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199502262234.QAA11986>