On 5/6/06, Matthew R. Dempsky <[EMAIL PROTECTED]> wrote:
I have looked into authpf(8) before and understand how it works, but the
following excerpt from the BUGS section of the man page puzzles me
somewhat:
The authenticating ssh(1) connection may be secured, but if the
network i
On Sun, May 07, 2006 at 12:39:44AM +0100, Stuart Henderson wrote:
> On 2006/05/06 11:49, S t i n g r a y wrote:
> > & as i am using a network in which i dont have control
> > over users PC & cannot use service authentication i am
> > stuck with ip & mac filtering.
>
> Look at authpf(8), it's much _
On 2006/05/06 11:49, S t i n g r a y wrote:
> & as i am using a network in which i dont have control
> over users PC & cannot use service authentication i am
> stuck with ip & mac filtering.
Look at authpf(8), it's much _much_ safer than what you suggest
(unless you have enough control to lock swi
On 5/6/06, S t i n g r a y <[EMAIL PROTECTED]> wrote:
Hello there
i am looking for a solution that lets me have some
sort of allow mac address & ipaddress that will be
able to access my server or servers & use what ever
service they are offering.
& as i am using a network in which i dont have co
Hello there
i am looking for a solution that lets me have some
sort of allow mac address & ipaddress that will be
able to access my server or servers & use what ever
service they are offering.
& as i am using a network in which i dont have control
over users PC & cannot use service authentication
5 matches
Mail list logo