Mailinglist Archive: opensuse-security (343 mails)

< Previous Next >
Re: [suse-security] buffer overflow in telnetd
  • From: Roman Drahtmueller <draht@xxxxxxx>
  • Date: Wed, 25 Jul 2001 19:41:40 +0200 (MEST)
  • Message-id: <Pine.LNX.4.33.0107251941250.24888-100000@xxxxxxxxxxxx>
> > > and it has a one time password system.
> > wie hast du das implementiert?
> > würde mich echt interessieren!
> >
>
> it is a simple script that is launched by the tcp wrappers. Nothing fancy
> and it only works if you have one user who logs in remotely (wrappers have
> of course no idea who is trying to log in). But for your average
> desktop system with one user, it should work.
>
> I looked into various S/key and OTP programs, but they all seem abandoned
> these days.

Have a look at opie, new in 7.2.

> Dirk

Thanks,
Roman.
--
- -
| Roman Drahtmüller <draht@xxxxxxx> // "Caution: Cape does |
SuSE GmbH - Security Phone: // not enable user to fly."
| Nürnberg, Germany +49-911-740530 // (Batman Costume warning label) |
- -


< Previous Next >
References