Skip site navigation (1)Skip section navigation (2)
Date:      Sun, 13 Dec 1998 19:58:51 -0500 (EST)
From:      Bill Fumerola <billf@jade.chc-chimes.com>
To:        Marc Slemko <marcs@znep.com>
Cc:        "David O'Brien" <obrien@NUXI.com>, committers@hub.freebsd.org
Subject:   Re: Swat teams (was: problem reports)
Message-ID:  <Pine.BSF.3.96.981213195523.9327A-100000@jade.chc-chimes.com>
In-Reply-To: <Pine.BSF.4.05.9812131447190.22888-100000@alive.znep.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On Sun, 13 Dec 1998, Marc Slemko wrote:

> > How does it authenticate?
> 
> HTTP basic authentication done by the web server.

Which would mean 
	a lack of an audit trail (if we used one catch-all name/password).
	a chance of sniffing (unless we implment our own certificate which
		we then distribute or something)
	an excellent means to brute force freefall passwords.
	blocking some people from using it (some of us don't have freefall
		passwords, just ssh identity.pub)
	out-of-sync passwords (if we made different passwords for this as
		opposed to freefall passwords)

I tend to be more open to Steve's ssh+gnatsd solution, even though I
haven't seen it, on principle alone.

- bill fumerola - billf@chc-chimes.com - BF1560 - computer horizons corp -
- ph:(800) 252-2421 - bfumerol@computerhorizons.com - billf@FreeBSD.org  -




To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe cvs-all" in the body of the message



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.3.96.981213195523.9327A-100000>