Date: Fri, 09 Oct 1998 22:21:14 -0500 From: "Jeffrey J. Mountin" <jeff-ml@mountin.net> To: Brandon Huey <bh@synergy.transbay.net> Cc: freebsd-security@FreeBSD.ORG Subject: RE: fwtk and skey authorization (+ssh) Message-ID: <3.0.3.32.19981009222114.007449dc@207.227.119.2> In-Reply-To: <Pine.BSF.3.96.981009133426.22833A-100000@synergy.transbay. net> References: <l03110708b2441198068e@[192.168.6.3]>
next in thread | previous in thread | raw e-mail | index | archive | help
At 01:35 PM 10/9/98 -0700, Brandon Huey wrote: > >on a related note, i recently discovered an s/key patched ssh and it's >working great. > >you can find it at: http://www.lackluster.net/~scott/ssh_skey.html Rather neat, but is it doing the OTP over an encrypted tunnel ie first you enter your private key password, then it prompts for a SKey password on the server. Or is this just so that you can use either RSA or SKey OTP authentication? Now if there was something to make it optional for POP, rather than mandatory. If you compile popper on a clean install, once you add a /etc/skey.access file and do not wish to use SKey, the access file need a permit. Would be better to use a 2nd access file, especially if you use an alternate passwd file. Just commenting, since it not extremely important in my case, which is why I haven't looked into it much. 8-) Jeff Mountin - Unix Systems TCP/IP networking jeff@mountin.net To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3.0.3.32.19981009222114.007449dc>