Repeated attacks via SSH

freebsd-security at auscert.org.au freebsd-security at auscert.org.au
Wed Oct 5 16:55:48 PDT 2005


> system (e.g. S/Key). (Which reminds me: Anyone have a good S/Key
> implementation for the Palm Pilot?)

Brett, on this note another tack you could take is to symmetrically encrypt
your list with GPG/PGP, being wary of where you choose to decrypt it. This
kind of thing, using gpg (where the path could be a removable device or
floppy):

opiekey -n 5 0499 xx9909 | sort -rn | ( sleep 10 ; gpg -ca -o /trusted/path )

... adding your preferred  --cipher-algo option as required, then as needed run:

gpg -o - /trusted/path | grep #seq_no

cheers,
-- Joel Hatton --
Security Analyst                    | Hotline: +61 7 3365 4417
AusCERT - Australia's national CERT | Fax:     +61 7 3365 7031
The University of Queensland        | WWW:     www.auscert.org.au
Qld 4072 Australia                  | Email:   auscert at auscert.org.au


More information about the freebsd-security mailing list