Re: Repeated attacks via SSH

看板FB_security作者時間20年前 (2005/10/06 07:57), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串23/23 (看更多)
> system (e.g. S/Key). (Which reminds me: Anyone have a good S/Key > implementation for the Palm Pilot?) Brett, on this note another tack you could take is to symmetrically encrypt your list with GPG/PGP, being wary of where you choose to decrypt it. This kind of thing, using gpg (where the path could be a removable device or floppy): opiekey -n 5 0499 xx9909 | sort -rn | ( sleep 10 ; gpg -ca -o /trusted/path ) .... adding your preferred --cipher-algo option as required, then as needed run: gpg -o - /trusted/path | grep #seq_no cheers, -- Joel Hatton -- Security Analyst | Hotline: +61 7 3365 4417 AusCERT - Australia's national CERT | Fax: +61 7 3365 7031 The University of Queensland | WWW: www.auscert.org.au Qld 4072 Australia | Email: auscert@auscert.org.au _______________________________________________ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org"
文章代碼(AID): #13H6XM00 (FB_security)
討論串 (同標題文章)
文章代碼(AID): #13H6XM00 (FB_security)