Date: Thu, 24 Sep 1998 22:01:38 +0200 From: Mark Murray <mark@grondar.za> To: Nate Williams <nate@mt.sri.com> Cc: Peter Wemm <peter@netplex.com.au>, Jonathan Lemon <jlemon@americantv.com>, committers@freebsd.org Subject: Re: Security and other facilities at WC CDROM - the plan. Message-ID: <199809242001.WAA27957@gratis.grondar.za> In-Reply-To: Your message of " Thu, 24 Sep 1998 13:39:48 CST." <199809241939.NAA00872@mt.sri.com> References: <199809241926.NAA00745@mt.sri.com> <199809241936.DAA22482@spinner.netplex.com.au> <199809241939.NAA00872@mt.sri.com>
next in thread | previous in thread | raw e-mail | index | archive | help
Nate Williams wrote: > > Set up s/key on your freefall account, generate and print out the next 10 > > or so passwords in sequence and carry them in your wallet.. You never > > know when you're going to need to log in from a machine or network you > > don't trust. > > Exactly! Do you have any documentations on how to do that? Start with the man pages for skey(1). > > (eg: terminal rooms where people have been tinkering with > > the machines for days and you don't know if you can trust the ssh on them). > > This is just what I was hoping for (assuming it work with a standard > telnet client from windows)? If so, then at that point I could > download/install a 'secure' connection from that point on. It works on the lowliest, rottenest telnet around :-) M -- Mark Murray Join the anti-SPAM movement: http://www.cauce.org
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199809242001.WAA27957>