home *** CD-ROM | disk | FTP | other *** search
- Path: sparky!uunet!gatech!darwin.sura.net!jvnc.net!rutgers!news.columbia.edu!usenet
- From: alan@curta.cc.columbia.edu (Alan Crosswell)
- Newsgroups: comp.protocols.kerberos
- Subject: Re: Encrypted rlogin/rlogind only?
- Message-ID: <1992Aug31.183459.26677@news.columbia.edu>
- Date: 31 Aug 92 18:34:59 GMT
- References: <1992Aug31.171149.13924@ncar.ucar.edu>
- Sender: usenet@news.columbia.edu (The Network News)
- Organization: Columbia University
- Lines: 20
- Nntp-Posting-Host: curta.cc.columbia.edu
-
- In article <1992Aug31.171149.13924@ncar.ucar.edu> mark@deluge.mmm.ucar.edu
- (Mark Bradford) writes:
- > Has anybody extracted just the encrypted rlogin/rlogind from the
- Kerberos
- > package? We interact with a site that is paranoid about plaintext
- > passwords being typed over the network, but is also paranoid about major
- > modifications to the operating system (read, "doesn't want to install
- > Kerberos"). The encrypted rlogin would help mollify them; has anybody
- > isolated it from the rest of Kerberos, or should I start hacking myself?
- > Thanks!
- >
- > --
- > -- Mark Bradford (bradfrd2@ncar.ucar.edu) <> To err is human, to moo
- bovine.
- > "It's an ill wind that gathers no moss."
-
- You need the rest of Kerberos, none of which is an OS modification,
- in order to use encrytped rlogin, since it is Kerberos that manages
- the initial session key exchange for rlogin to encrypt with.
- /a
-