Date: Thu, 06 Oct 2005 09:55:45 +1000 From: freebsd-security@auscert.org.au To: freebsd-security@freebsd.org Subject: Re: Repeated attacks via SSH Message-ID: <200510052355.j95NtjVo084768@app.auscert.org.au> In-Reply-To: Your message of "Sun, 02 Oct 2005 16:32:39 CST." <6.2.3.4.2.20051002162545.08f66558@localhost>
next in thread | previous in thread | raw e-mail | index | archive | help
> system (e.g. S/Key). (Which reminds me: Anyone have a good S/Key > implementation for the Palm Pilot?) Brett, on this note another tack you could take is to symmetrically encrypt your list with GPG/PGP, being wary of where you choose to decrypt it. This kind of thing, using gpg (where the path could be a removable device or floppy): opiekey -n 5 0499 xx9909 | sort -rn | ( sleep 10 ; gpg -ca -o /trusted/path ) ... adding your preferred --cipher-algo option as required, then as needed run: gpg -o - /trusted/path | grep #seq_no cheers, -- Joel Hatton -- Security Analyst | Hotline: +61 7 3365 4417 AusCERT - Australia's national CERT | Fax: +61 7 3365 7031 The University of Queensland | WWW: www.auscert.org.au Qld 4072 Australia | Email: auscert@auscert.org.au
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200510052355.j95NtjVo084768>