Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 06 Oct 2005 09:55:45 +1000
From:      freebsd-security@auscert.org.au
To:        freebsd-security@freebsd.org
Subject:   Re: Repeated attacks via SSH 
Message-ID:  <200510052355.j95NtjVo084768@app.auscert.org.au>
In-Reply-To: Your message of "Sun, 02 Oct 2005 16:32:39 CST." <6.2.3.4.2.20051002162545.08f66558@localhost> 

next in thread | previous in thread | raw e-mail | index | archive | help

> system (e.g. S/Key). (Which reminds me: Anyone have a good S/Key
> implementation for the Palm Pilot?)

Brett, on this note another tack you could take is to symmetrically encrypt
your list with GPG/PGP, being wary of where you choose to decrypt it. This
kind of thing, using gpg (where the path could be a removable device or
floppy):

opiekey -n 5 0499 xx9909 | sort -rn | ( sleep 10 ; gpg -ca -o /trusted/path )

... adding your preferred  --cipher-algo option as required, then as needed run:

gpg -o - /trusted/path | grep #seq_no

cheers,
-- Joel Hatton --
Security Analyst                    | Hotline: +61 7 3365 4417
AusCERT - Australia's national CERT | Fax:     +61 7 3365 7031
The University of Queensland        | WWW:     www.auscert.org.au
Qld 4072 Australia                  | Email:   auscert@auscert.org.au



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200510052355.j95NtjVo084768>