home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
kermit.columbia.edu
/
kermit.columbia.edu.tar
/
kermit.columbia.edu
/
newsgroups
/
misc.19980424-19980901
/
000353_news@newsmaster….columbia.edu _Mon Aug 10 20:05:33 1998.msg
< prev
next >
Wrap
Internet Message Format
|
1998-08-31
|
2KB
Return-Path: <news@newsmaster.cc.columbia.edu>
Received: from newsmaster.cc.columbia.edu (newsmaster.cc.columbia.edu [128.59.35.30])
by watsun.cc.columbia.edu (8.8.5/8.8.5) with ESMTP id UAA17160
for <kermit.misc@watsun.cc.columbia.edu>; Mon, 10 Aug 1998 20:05:31 -0400 (EDT)
Received: (from news@localhost)
by newsmaster.cc.columbia.edu (8.8.5/8.8.5) id UAA22904
for kermit.misc@watsun; Mon, 10 Aug 1998 20:05:30 -0400 (EDT)
Path: news.columbia.edu!sol.ctr.columbia.edu!news.mindlink.net!paralynx!paralynx-2!wolfe.paralynx.net!paralynx!paralynx-4!van-bc!paralynx!paralynx-1!News.Vancouver.iSTAR.net!news.istar.net!nntprelay.mathworks.com!woodstock.news.demon.net!demon!dispose.news.demon.net!demon!news.demon.co.uk!demon!antipope.demon.co.uk!charlie
From: charlie@pc.antipope.org (Charlie Stross)
Newsgroups: comp.protocols.kermit.misc
Subject: Re: FTP versus Telnet connect
Date: Mon, 10 Aug 1998 22:52:28 +0100
Organization: Chateau Antipope retirement home for senescent computers
Message-ID: <slrn6suqss.7pe.charlie@pc.antipope.org>
References: <35CF4F12.5FF6@ibm.net>
Reply-To: charlie@nospam.antipope.org
NNTP-Posting-Host: antipope.demon.co.uk
X-NNTP-Posting-Host: antipope.demon.co.uk:158.152.11.49
X-Trace: news.demon.co.uk 902793752 nnrp-05:26609 NO-IDENT antipope.demon.co.uk:158.152.11.49
X-Complaints-To: abuse@demon.net
X-Newsreader: slrn (0.9.4.3 UNIX)
Lines: 16
Xref: news.columbia.edu comp.protocols.kermit.misc:9070
On Mon, 10 Aug 1998 14:50:42 -0500, Hal W. Hensley
<hwhens@ibm.net> wrote:
[ snip -- client runs an ftpd on their firewall, but not telnetd ]
Have you considered trying to convince your client to run some kind
of secure connection, like ssh or rlogin with something like Kerberos
authentication or DES encryption? Kermit will work over rlogin (though
I'm not sure about encrypted rlogin sessions and/or Kerberos), and
you can tunnel other protocols through ssh. Indeed, ssh is specifically
designed with encrypted connections in mind so it may be possible
to convince your client that it will not compromise their firewall
security -- if properly configured.
-- Charlie