Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 1 Jun 1998 21:18:55 -0700 (PDT)
From:      Roger Marquis <marquis@roble.com>
To:        freebsd-security@FreeBSD.ORG
Subject:   SSH + s/key (was: Re: MD5 v. DES)
Message-ID:  <Pine.SUN.3.96.980601210938.14212B-100000@roble.com>
In-Reply-To: <19980602015132.55099@follo.net>

next in thread | previous in thread | raw e-mail | index | archive | help
On Tue, 2 Jun 1998, Eivind Eklund wrote:
> The SSH-1 protocol doesn't make it possible to use s/key for one-time
> passwords, at least.  There is no provision for showing a challenge to
> the user.

Partly true.  You can accomplish the same goal by creating an "skey"  user
account with no password and skeysh as the shell.  "ssh <remote_host> -l
skey" will establish an encrypted connection, log into the skey account
and ask for a username before displaying the skey sequence number and
password prompt.

Roger Marquis
Roble Systems Consulting
http://www.roble.com/consulting


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe security" in the body of the message



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.SUN.3.96.980601210938.14212B-100000>