Date: Sun, 13 Dec 1998 19:58:51 -0500 (EST) From: Bill Fumerola <billf@jade.chc-chimes.com> To: Marc Slemko <marcs@znep.com> Cc: "David O'Brien" <obrien@NUXI.com>, committers@hub.freebsd.org Subject: Re: Swat teams (was: problem reports) Message-ID: <Pine.BSF.3.96.981213195523.9327A-100000@jade.chc-chimes.com> In-Reply-To: <Pine.BSF.4.05.9812131447190.22888-100000@alive.znep.com>
next in thread | previous in thread | raw e-mail | index | archive | help
On Sun, 13 Dec 1998, Marc Slemko wrote: > > How does it authenticate? > > HTTP basic authentication done by the web server. Which would mean a lack of an audit trail (if we used one catch-all name/password). a chance of sniffing (unless we implment our own certificate which we then distribute or something) an excellent means to brute force freefall passwords. blocking some people from using it (some of us don't have freefall passwords, just ssh identity.pub) out-of-sync passwords (if we made different passwords for this as opposed to freefall passwords) I tend to be more open to Steve's ssh+gnatsd solution, even though I haven't seen it, on principle alone. - bill fumerola - billf@chc-chimes.com - BF1560 - computer horizons corp - - ph:(800) 252-2421 - bfumerol@computerhorizons.com - billf@FreeBSD.org - To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe cvs-all" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.3.96.981213195523.9327A-100000>