From owner-freebsd-hackers Tue Oct 24 18:47:17 1995 Return-Path: owner-hackers Received: (from root@localhost) by freefall.freebsd.org (8.6.12/8.6.6) id SAA17362 for hackers-outgoing; Tue, 24 Oct 1995 18:47:17 -0700 Received: from Shug-Internet.Saar.DE (root@shug-internet.saar.de [192.109.53.4]) by freefall.freebsd.org (8.6.12/8.6.6) with ESMTP id SAA17326 for ; Tue, 24 Oct 1995 18:47:03 -0700 Received: from TMPuhf.Saar.DE (tmpuhf.saar.de [192.109.53.3]) by Shug-Internet.Saar.DE (8.6.8.1/8.5) with SMTP id CAA13612; Wed, 25 Oct 1995 02:46:32 +0100 Received: from ramsey by TMPuhf.Saar.DE with uucp (Smail3.1.28.1 #1) id m0t7uvD-00020zC; Wed, 25 Oct 95 02:46 WET Received: by ramsey.saar.de (/\oo/\ Smail3.1.29.1 #1) id ; Wed, 25 Oct 95 02:27 MET Message-Id: Date: Wed, 25 Oct 95 02:27 MET From: torstenb@ramsey.saar.de (Torsten Blum) To: hackers@FreeBSD.org Cc: roberto@keltia.freenix.fr Reply-To: torstenb@FreeBSD.org Subject: Re: Kerberized Encrypted Telnet for 2.0.5R References: <199510242034.PAA03675@brasil.moneng.mei.com> <199510242335.AAA16768@keltia.freenix.fr> Sender: owner-hackers@FreeBSD.org Precedence: bulk Olliver Robert wrote: >Not to undermine our encrypting telnet, but you should try SSH... It has >many features that are better than telnet. It can do X11 encryption, >replace rlogin/rcp/rsh, support more encryption algorithms and more. > ports/security/ssh/ ;) -tb