From owner-freebsd-hackers Sun Feb 26 21:58:35 1995 Return-Path: hackers-owner Received: (from majordom@localhost) by freefall.cdrom.com (8.6.9/8.6.6) id VAA00775 for hackers-outgoing; Sun, 26 Feb 1995 21:58:35 -0800 Received: from precipice.Shockwave.COM (precipice.shockwave.com [171.69.108.33]) by freefall.cdrom.com (8.6.9/8.6.6) with ESMTP id VAA00746; Sun, 26 Feb 1995 21:58:26 -0800 Received: from localhost (localhost [127.0.0.1]) by precipice.Shockwave.COM (8.6.10/8.6.9) with SMTP id VAA02393; Sun, 26 Feb 1995 21:57:01 -0800 Message-Id: <199502270557.VAA02393@precipice.Shockwave.COM> To: Peter da Silva cc: "Jordan K. Hubbard" , hackers@freefall.cdrom.com, security@freefall.cdrom.com Subject: Re: key exchange for rlogin/telnet services? In-reply-to: Your message of "Sun, 26 Feb 1995 16:34:31 CST." <199502262234.QAA11986@bonkers.taronga.com> Date: Sun, 26 Feb 1995 21:57:01 -0800 From: Paul Traina Sender: hackers-owner@FreeBSD.org Precedence: bulk FreeBSD already has full support for S/Key. What's the difference between this and Hobbit's SecureKey? From: Peter da Silva Subject: Re: key exchange for rlogin/telnet services? One half-baked answer. First, get SecureKey. The version I use, Hobbit's, is sitting on NMTI's anonymous FTP server smokey.neosoft.com in source, Alpha/OS >>F executable, and DOS executable. I'll ftp it over to freefall Mondey. It uses a challenge string/encrypted challenge response method to keep from passing passwords out to everyone. You don't get an encrypted session, but you don't need any special software or arrangements at the other end. A more complex answer is swIPe, which lets you run a complete encrypted IP session on top of an IP channel. This requires you have at least a secure site in the badguy's camp.