Date: Wed, 20 Mar 2002 03:05:18 +0000 From: Alex Holst <a@area51.dk> To: freebsd-security@freebsd.org Subject: Re: Safe SSH logins from public, untrusted Windows computers Message-ID: <20020320030518.GB53513@area51.dk> In-Reply-To: <20020319152125.F43336@palomine.net> References: <20020319144538.A42969@palomine.net> <20020319131408.C324@ophiuchus.kazrak.com> <20020319152125.F43336@palomine.net>
next in thread | previous in thread | raw e-mail | index | archive | help
Quoting Chris Johnson (cjohnson@palomine.net): > Thanks very much for this; it seems to be just the ticket. I didn't know > anything about S/Key, other than it's the thing I recently turned off in my > sshd_config file because sshd was prompting me for things to which I didn't > know the answer. Note that captured S/Key passphrases can be bruteforced like anything else, so make sure you pick a *strong* secret. Change your secret regularly (e.g. between travels) to avoid a captured S/Key phrase resulting in a lost secret. -- I prefer the dark of the night, after midnight and before four-thirty, when it's more bare, more hollow. http://a.area51.dk/ To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20020320030518.GB53513>