Home
| Calendar
| Mail Lists
| List Archives
| Desktop SIG
| Hardware Hacking SIG
Wiki | Flickr | PicasaWeb | Video | Maps & Directions | Installfests | Keysignings Linux Cafe | Meeting Notes | Linux Links | Bling | About BLU |
On Tue, 2003-07-29 at 22:01, Konrad wrote: > Regards your comment about "anyone can access the port and try to login by > guessing a password, whereas with ssh, someone would have to first break > ssh to get in. " that seems wrong. Anyone can access SSH port and also > guess the password. How does that correspond to "break SSH" ? Actually, I've configured sshd on my home server so it doesn't use password authentication at all. The only way to login through ssh is with a dsa key. -- John Abreau / Executive Director, Boston Linux & Unix Email jabr at blu.org / WWW http://www.abreau.net / PGP-Key-ID 0xD5C7B5D9 PGP-Key-Fingerprint 72 FB 39 4F 3C 3B D6 5B E0 C8 5A 6E F1 2C BE 99 -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 307 bytes Desc: This is a digitally signed message part URL: <http://lists.blu.org/pipermail/discuss/attachments/20030730/37e7ebc9/attachment.sig>
BLU is a member of BostonUserGroups | |
We also thank MIT for the use of their facilities. |