From owner-freebsd-security Sun Feb 26 23:28:22 1995 Return-Path: security-owner Received: (from majordom@localhost) by freefall.cdrom.com (8.6.9/8.6.6) id XAA05426 for security-outgoing; Sun, 26 Feb 1995 23:28:22 -0800 Received: from UUCP-GW.CC.UH.EDU (root@UUCP-GW.CC.UH.EDU [129.7.1.11]) by freefall.cdrom.com (8.6.9/8.6.6) with SMTP id XAA05385; Sun, 26 Feb 1995 23:27:59 -0800 Received: from Taronga.COM by UUCP-GW.CC.UH.EDU with UUCP id AA20803 (5.67a/IDA-1.5); Mon, 27 Feb 1995 01:11:50 -0600 Received: by bonkers.taronga.com (smail2.5p) id AA21580; 27 Feb 95 01:11:12 CST (Mon) Received: from localhost (localhost [127.0.0.1]) by bonkers.taronga.com (8.6.8/8.6.6) with SMTP id BAA21577; Mon, 27 Feb 1995 01:11:12 -0600 Message-Id: <199502270711.BAA21577@bonkers.taronga.com> X-Authentication-Warning: bonkers.taronga.com: Host localhost didn't use HELO protocol To: "Jordan K. Hubbard" Cc: hackers@freefall.cdrom.com, security@freefall.cdrom.com Subject: Re: key exchange for rlogin/telnet services? In-Reply-To: Your message of "Sun, 26 Feb 95 17:54:58 PST." <16925.793850098@freefall.cdrom.com> X-Mailer: exmh version 1.4.1 7/21/94 Date: Mon, 27 Feb 1995 01:11:09 -0600 From: Peter da Silva Sender: security-owner@FreeBSD.org Precedence: bulk > Sorry, but this still just doesn't do it for me. I will be doing > other logins within that session, or often need to `su' to do system > repair work. There's an skeylogin and an skeysu in there, so you can use skey for all your authentication needs.