Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 3 Oct 2005 11:24:20 -0300
From:      Fernan Aguero <fernan@iib.unsam.edu.ar>
To:        Randy Bush <randy@psg.com>
Cc:        freebsd-security@freebsd.org, Daniel Gerzo <danger@rulez.sk>
Subject:   Re: Repeated attacks via SSH
Message-ID:  <20051003142420.GJ61107@iib.unsam.edu.ar>
In-Reply-To: <17217.14065.212429.584572@roam.psg.com>
References:  <6.2.3.4.2.20051002153930.07a50528@localhost> <1048266117.20051003001242@rulez.sk> <6.2.3.4.2.20051002162545.08f66558@localhost> <17217.14065.212429.584572@roam.psg.com>

next in thread | previous in thread | raw e-mail | index | archive | help
+----[ Randy Bush <randy@psg.com> (03.Oct.2005 10:51):
|
| > Of course, the problem is that if you need to get access in an
| > emergency from who-knows-where, you're pretty much stuck with
| > passwords unless you have a token system or a one time password
| > system (e.g. S/Key). (Which reminds me: Anyone have a good S/Key
| > implementation for the Palm Pilot?)
| 
| sshv2 with keys for palm at <http://shrug.csl.uiuc.edu/~sachs/palm/>.
| works great on my treo 650.
|
+----]

pilOTP:
http://astro.uchicago.edu/home/web/valdes/pilot/pilOTP/

Fernan



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20051003142420.GJ61107>