Hi there,
         I guess that password complexity is not the issue here. It's
incredibly easy to 'sniff' plain text passwords off of a LAN! However if
your happy no one is going to attempt this then telnet without ssh is
fine.
Just my twopennyworth.

Regards JohnG 


32865e97b5342e762ab140e00f3da23b - Just 'Debian'


On Thu, 27 Apr 2000, Noah L. Meyerhans wrote:

> -----BEGIN PGP SIGNED MESSAGE-----
> 
> On Thu, 27 Apr 2000, w trillich wrote:
> 
> > # apt-get install ssh
> > Reading Package Lists... Done
> > Building Dependency Tree... Done
> > Package ssh has no available version, but exists in the database.
> > This typically means that the package was mentioned in a dependency and
> > never uploaded, has been obsoleted or is not available with the contents
> > of sources.list
> > E: Package ssh has no installation candidate
> > 
> 
> Add the following line to /etc/apt/sources.list:
> deb http://non-us.debian.org /potato/non-US main contrib non-free
> 
> On the other hand, I do not feel as strongly as other posters that telnet
> needs to be disabled in order to have a secure machine.  Strong passwords
> will work just as well.  I have an account on a large Solaris network
> where telnet has been open for ages, and will continue to be.  The passwd
> program in *incredibly* anal about ensuring that all passwords are
> complex.  To my knowledge there has never been a significant security
> breach on this network.
> 
> noah
> 
>   PGP Public Key available at http://web.morgul.net/~frodo/mail.html 
>   or by `finger -l [EMAIL PROTECTED] 
> 
> 
> -----BEGIN PGP SIGNATURE-----
> Version: 2.6.3a
> Charset: noconv
> 
> iQCVAwUBOQg6UYdCcpBjGWoFAQHgswP/akY6CGn1dYsk65yTcm5suKjCU28YxgD0
> Z+Hx0s2ftuWnp9BUz6GstO10WHRyOvHJ3wEpHWn8yoti3ywsW53EIGzEznNwC+lv
> tn5P+Z2x4b4320PTKkQY5EBCASW8uH9c4VbF6e66aY68EpqZS9YFtW2ZStWapnm8
> kUzWMob163E=
> =kx57
> -----END PGP SIGNATURE-----
> 
> 
> -- 
> Unsubscribe?  mail -s unsubscribe [EMAIL PROTECTED] < /dev/null
> 
> 

Reply via email to