Repeated attacks via SSH
freebsd-security at auscert.org.au
freebsd-security at auscert.org.au
Wed Oct 5 16:55:48 PDT 2005
> system (e.g. S/Key). (Which reminds me: Anyone have a good S/Key
> implementation for the Palm Pilot?)
Brett, on this note another tack you could take is to symmetrically encrypt
your list with GPG/PGP, being wary of where you choose to decrypt it. This
kind of thing, using gpg (where the path could be a removable device or
floppy):
opiekey -n 5 0499 xx9909 | sort -rn | ( sleep 10 ; gpg -ca -o /trusted/path )
... adding your preferred --cipher-algo option as required, then as needed run:
gpg -o - /trusted/path | grep #seq_no
cheers,
-- Joel Hatton --
Security Analyst | Hotline: +61 7 3365 4417
AusCERT - Australia's national CERT | Fax: +61 7 3365 7031
The University of Queensland | WWW: www.auscert.org.au
Qld 4072 Australia | Email: auscert at auscert.org.au
More information about the freebsd-security
mailing list