Re: [suse-security] buffer overflow in telnetd
On Wed, 25 Jul 2001, Markus Gaugusch wrote:
and it has a one time password system. wie hast du das implementiert? würde mich echt interessieren!
it is a simple script that is launched by the tcp wrappers. Nothing fancy and it only works if you have one user who logs in remotely (wrappers have of course no idea who is trying to log in). But for your average desktop system with one user, it should work. I looked into various S/key and OTP programs, but they all seem abandoned these days. Dirk
and it has a one time password system. wie hast du das implementiert? würde mich echt interessieren!
it is a simple script that is launched by the tcp wrappers. Nothing fancy and it only works if you have one user who logs in remotely (wrappers have of course no idea who is trying to log in). But for your average desktop system with one user, it should work.
I looked into various S/key and OTP programs, but they all seem abandoned these days.
Have a look at opie, new in 7.2.
Dirk
Thanks, Roman. -- - - | Roman Drahtmüller <draht@suse.de> // "Caution: Cape does | SuSE GmbH - Security Phone: // not enable user to fly." | Nürnberg, Germany +49-911-740530 // (Batman Costume warning label) | - -
participants (2)
-
dirk janssen
-
Roman Drahtmueller