Date: Fri, 5 Dec 1997 15:23:03 -0600 (CST) From: Jim Bryant <jbryant@unix.tfs.net> To: brian@firehouse.net (Brian Mitchell) Cc: freebsd-hackers@freebsd.org Subject: Re: Telnet Root access Message-ID: <199712052123.PAA00981@unix.tfs.net> In-Reply-To: <Pine.BSI.3.95.971205161406.11503A-100000@shell.firehouse.net> from Brian Mitchell at "Dec 5, 97 04:15:38 pm"
next in thread | previous in thread | raw e-mail | index | archive | help
In reply: > On Fri, 5 Dec 1997, Jim Bryant wrote: > > > ahem... > > > > why would one wish to have the root password pass over an insecure > > network in plaintext form??? > > > > man su > > This is pretty dumb, as the password is _still_ passing over an insecure > network in plaintext form. oops... i've already clarified this in a previous posting... su under ssh... > > > > also, for most practical purposes, you should not even be using > > telnet... i suggest using ssh/sshd, because no passwords, in fact > > nothing in the entire session, is transmitted in plaintext. > > Well, some client information is transmitted in plaintext; it does that to > determine what ssh capabilities the other side has. oops... well, still nothing in the user session will be plaintext... jim -- All opinions expressed are mine, if you | "I will not be pushed, stamped, think otherwise, then go jump into turbid | briefed, debriefed, indexed, or radioactive waters and yell WAHOO !!! | numbered!" - #1, "The Prisoner" ------------------------------------------------------------------------------ Inet: jbryant@tfs.net AX.25: kc5vdj@wv0t.#neks.ks.usa.noam grid: EM28pw voice: KC5VDJ - 6 & 2 Meters AM/FM/SSB, 70cm FM. http://www.tfs.net/~jbryant ------------------------------------------------------------------------------ HF/6M/2M: IC-706-MkII, 2M: HTX-212, 2M: HTX-202, 70cm: HTX-404, Packet: KPC-3+
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199712052123.PAA00981>