On Monday 02 March 2009 03:14:15 Chris Palmer wrote:
> Why are people logging into their remote servers from
> assumed-untrustworthy clients at all?
Because the inconvience of not using whatever service or data the server is
providing is considered greater than the security risk.
Cheers
Benjamin
Hi Alexander,
On Thursday 12 February 2009 10:41:19 Alexander Leidinger wrote:
> - Implement something which is similar o freeauth.org, just better
> implemented and without the "not so good" stuff / design decissions.
>
> Short: they need something you know (PIN) + something you have (e.g.
> toke
Hello,
I've been thinking about what to do about OPIE, and I see the following
possibilities. (Note: this is mainly just a braindump to collect my
thoughts; many details that seem obvious to me are omitted. I'm making it
public because others might be interested in it too.)
- Enhance OPIE to u
Hello,
I run a firewall where I use OPIE one time passwords for external logins,
figuring that this gives me some added protections if I ever need to access
it from untrustworthy hosts. A message about the weakness of MD5 got me
thinking that maybe a better algorithm could be used for OPIE, and
On Tuesday 29 July 2008 04:36:27 Tim Clewlow wrote:
> I'd like to offer a possible solution that I believe can be both
> secure and usable. This will use the AID concept outlined above.
>
> (Note, when I refer to a rwx flag in the following paragraphs, I am
> talking about a flag in a 4th group, ie
Attila Nagy wrote:
> Hello,
>
> I'm wondering about closing some information leaks in FreeBSD jails from
> the "outside world".
>
> Not that critical (depends on the application), but a simple user, with
> restricted devfs in the jail (devfsrules_jail for example from
> /etc/defaults/devfs.rules) c