Date: Mon, 1 May 2000 16:26:05 -0700 (PDT) From: Kris Kennaway <kris@FreeBSD.org> To: Brian Reichert <reichert@numachi.com> Cc: freebsd-security@freebsd.org Subject: Re: OpenSSH-1.2.2 + S/Key Message-ID: <Pine.BSF.4.21.0005011623420.25102-100000@freefall.freebsd.org> In-Reply-To: <20000501185340.A7346@numachi.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On Mon, 1 May 2000, Brian Reichert wrote: > I _must_ be missing something. Yeah, it's not activated yet. I have patches almost ready to do this - they work fine for OPIE logins (OPIE is the successor to S/Key, but OpenBSD still call it S/Key), but aren't quite complete for presenting realistic "fake" challenges for nonexistent users so that attackers can't figure out whether an account is OPIE-enabled. I can send them to you for testing if you'd like. Kris ---- In God we Trust -- all others must submit an X.509 certificate. -- Charles Forsythe <forsythe@alum.mit.edu> To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.21.0005011623420.25102-100000>