Date: Sun, 28 Aug 2005 12:07:29 -0500 From: Kirk Strauser <kirk@strauser.com> To: freebsd-questions@freebsd.org Subject: Re: Illegal access attempt - FreeBSD 5.4 Release - please advise Message-ID: <200508281207.33757.kirk@strauser.com> In-Reply-To: <200508280029.j7S0T7X4043956@app.auscert.org.au> References: <200508280029.j7S0T7X4043956@app.auscert.org.au>
next in thread | previous in thread | raw e-mail | index | archive | help
--nextPart1558086.UAiX7h9ytx Content-Type: text/plain; charset="iso-8859-1" Content-Transfer-Encoding: quoted-printable Content-Disposition: inline On Saturday 27 August 2005 07:29 pm, freebsd-questions@auscert.org.au wrote: > I'm curious about this bit - what do you do about accidentally mistyped > usernames by valid users? Have users do this: $ cat >> .ssh/config Host paranoidhost Hostname paranoid.example.com User getthisright =2E..and the problem is solved. Do people actually type their username for= a=20 particular host more than once? =2D-=20 Kirk Strauser --nextPart1558086.UAiX7h9ytx Content-Type: application/pgp-signature -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.2 (FreeBSD) iD8DBQBDEe9V5sRg+Y0CpvERAvVTAJ4/0u5uq2nKSQo3MyO+YMeuzFMHFgCfQSTV 1g3XCuu9mGpioTN49t1bpLI= =RcZN -----END PGP SIGNATURE----- --nextPart1558086.UAiX7h9ytx--
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200508281207.33757.kirk>