From: “Perry E. Metzger” <perry@snark.imsi.com>
To: Ed Carp <ecarp@netcom.com>
Message Hash: 972add4c079a32528fb89538eaa91465d0e9156ace49b53a3cac5a5556181ab7
Message ID: <9404252019.AA05719@snark.imsi.com>
Reply To: <Pine.3.89.9404251208.A28811-0100000@netcom10>
UTC Datetime: 1994-04-25 20:20:25 UTC
Raw Date: Mon, 25 Apr 94 13:20:25 PDT
From: "Perry E. Metzger" <perry@snark.imsi.com>
Date: Mon, 25 Apr 94 13:20:25 PDT
To: Ed Carp <ecarp@netcom.com>
Subject: Re: Wow, what a key!
In-Reply-To: <Pine.3.89.9404251208.A28811-0100000@netcom10>
Message-ID: <9404252019.AA05719@snark.imsi.com>
MIME-Version: 1.0
Content-Type: text/plain
Ed Carp says:
> In that spirit, spurred on by my f**king netcom account being broken into
> by some idiot with a packet sniffer, I've been looking into hacking
> "pgptalk" (actually, ytalk with a popen() call to pgp and D-H key
> exchange) to provide the same sort of functionality for telnet. The
> target platforms are SunOS (which is what netcom runs) and linux.
As I've mentioned previously to people, there is an actual, live,
honest to god RFC for doing authentication and encryption of telnet
sessions, and the 4.4 BSD release contains the actual, honest to god
code. I would suggest looking at that before reinventing the wheel.
All sites ought to support it -- its a big win.
Perry
Return to April 1994
Return to “tcmay@netcom.com (Timothy C. May)”