[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: Future of kerberised telnet, login, rsh, ftp?
- To: sxw@inf.ed.ac.uk
- Subject: Re: Future of kerberised telnet, login, rsh, ftp?
- From: Brian May <bam@snoopy.apana.org.au>
- Date: Thu, 07 Jul 2005 11:53:12 +1000
- Cc: heimdal-discuss@sics.se
- In-Reply-To: <Pine.LNX.4.44.0507070116590.31647-100000@hadrian.inf.ed.ac.uk> (sxw@inf.ed.ac.uk's message of "Thu, 7 Jul 2005 01:20:39 +0100 (BST)")
- Mail-Followup-To: sxw@inf.ed.ac.uk, heimdal-discuss@sics.se
- References: <sa4slyrses2.fsf@snoopy.microcomaustralia.com.au><Pine.LNX.4.44.0507070116590.31647-100000@hadrian.inf.ed.ac.uk>
- Sender: owner-heimdal-discuss@sics.se
- User-Agent: T-gnus/6.17.2 (based on No Gnus v0.2) SEMI/1.14.6 (Maruoka) FLIM/1.14.6 (Marutamachi) APEL/10.6 Emacs/21.4 (i386-pc-linux-gnu) MULE/5.0 (SAKAKI)
>>>>> "sxw" == sxw <sxw@inf.ed.ac.uk> writes:
sxw> Not as currently distributed. telnet will use Kerberos to
sxw> verify the identity of the server that you're connecting
sxw> to. If you're a site that wishes to run unpatched code, there
sxw> isn't an open-source Unix sshd that can provide this. See
sxw> earlier mails about GSSAPI key-exchange.
telnetd also requires patching. Standard telnet doesn't support GSSAPI
either.
--
Brian May <bam@snoopy.apana.org.au>