Date: Sun, 15 Aug 1999 15:33:37 -0700 From: Nick Sayer <nsayer@quack.kfu.com> To: walton@nordicrecords.com Cc: freebsd-hackers@freebsd.org Subject: Re: Whither makefiles for src/crypto/telnet/* ? Message-ID: <37B74041.F24CCFB4@quack.kfu.com> References: <19990815221506.26168.qmail@modgud.nordicrecords.com>
next in thread | previous in thread | raw e-mail | index | archive | help
[-- Attachment #1 --] Dave Walton wrote: > > On 14 Aug 99, at 5:43, Nick Sayer wrote: > > > Dave Walton wrote: > > > > > > If you really want to work on an encrypted telnet, check out The > > > Stanford SRP Authentication Project (http://srp.stanford.edu/srp/). > > > I'd love to see SRP integrated into the FreeBSD telnet/telnetd. > > > > Again, the problem is that there is administrative overhead - a separate > > password database is required. > > Yes, there is /etc/tpasswd to deal with. I guess what I should have > said is that I'd love to see SRP integrated into FreeBSD (as PAM, > perhaps?). Properly done, the various system utilities would keep > passwd, master.passwd and tpasswd in sync, and SRP > authentication/encryption would be available to telnet, ftp, or > anything else. True enough. You'd have to force your users to run 'passwd' once as a conversion step, and you'd have to modify scripts like 'adduser' to set up the new format. > (Disclaimer: Authentication and PAM are way outside of anything I > know anything about, so I really have no idea what it would take to > make that work.) > > > Keep in mind, also, that as long as AUTHTYPE_SRP and > > AUTHTYPE_SRA are different numbers, both could be present. I > > would even conceed that SRP should be tried before SRA. But I'd > > sure as hell rather use SRA than nothing. > > Ok, Nick implements SRA for folks in heterogenous NIS > environments, and Kris implements SRP for those of us without > that restriction. How's that for a non-cryptographic compromise? :) I can commit SRA into src/crypto/telnet immediately, if it is appropriate to do so. > Unfortunately, this whole discussion ignores one ugly problem: > client availability. It's a chicken and egg problem. But I am sure that if we build it, they will come. But only if it comes by default and has no overhead and works with legacy systems -- that is, it is a no effort drop-in. People who type "telnet" will just magically see that their session is encrypted without them doing anything different. THAT'S the only way it will start to happen. [-- Attachment #2 --] 0a *H R0N10 + 0 *H 0050 *H 010 UZA10UWestern Cape10UDurbanville10U Thawte Consulting1)0'U Thawte PF RSA IK 1998.9.16 17:551604U-Thawte Personal Freemail RSA Issuer 1998.9.160 990630184918Z 000629184918Z0F10UThawte Freemail Member1#0! *H nsayer@quack.kfu.com00 *H 0 =iIڠIHDs蠭s-ﻌ˗粷Qxӳ>g,a+c$% /uU,, ѿ2܊1n|:ѓJN1#f(̔U T0R0 `HB0U0U0 0U#0>`k3Xq80 *H gp5} ok<8a'GS=Xf+]4*]9͡Oɱ?^6eF> 04}x44Nmv2xƴpQB^ϑڽz'?j˘ܰ[090 0 *H 010 UZA10UWestern Cape10U Cape Town10U Thawte Consulting1(0&UCertification Services Division1$0"UThawte Personal Freemail CA1+0) *H personal-freemail@thawte.com0 980916175534Z 000915175534Z010 UZA10UWestern Cape10UDurbanville10U Thawte Consulting1)0'U Thawte PF RSA IK 1998.9.16 17:551604U-Thawte Personal Freemail RSA Issuer 1998.9.1600 *H 0 ĥ_!}$k kГ$h,OgCA#0v1P&T(⸛2< lO5Ov OE`АɜR*56<<5/ 7050U0 0U#0rIs4Uvr~wƲ0 *H ,ǂC>i\d+˛P@ºv<@UUy )W(> X[-3X5vr)BZw_'ۚ-NҍVeޕSk"z+a^zZ100010 UZA10UWestern Cape10UDurbanville10U Thawte Consulting1)0'U Thawte PF RSA IK 1998.9.16 17:551604U-Thawte Personal Freemail RSA Issuer 1998.9.160 + 0 *H 1 *H 0 *H 1 990815223340Z0# *H 1ӊ>gF&pUs0R *H 1E0C0 *H 0*H 0+0 *H @0 *H (0 *H 2w9[δ0 }g|&jk.mk@R&dWRwSO)tq~ کo`9#Y֟1xM<N [`6̂䟀Ck.BsL2
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?37B74041.F24CCFB4>
