
Mailing List Archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
Re: [tlug] SSH'ing to home with only port 80
- Date: Tue, 01 Nov 2005 11:10:17 +0900
- From: Shawn <shawn@example.com>
- Subject: Re: [tlug] SSH'ing to home with only port 80
- References: <9c414c890510261809u778bc81aq212b7505ccbeb400@example.com> <20051028103654.573c1c95@example.com> <9c414c890510280539o41f25430x17fb74aea831fcf2@example.com> <d8fcc0800510281806x48f387cfi4e855a5a067dea7e@example.com> <9c414c890510281932h597330fy470f60b178de1ded@example.com> <1130569428.4612.16.camel@example.com> <87k6ftiuch.fsf@example.com> <1130805350.4439.8.camel@example.com> <87ll09gmlg.fsf@example.com>
> Unfortunately, that turns out to be useless---the intruder simply
> sends the intercepted PGP file to the servlet. A sufficiently dumb
> intruder might not even notice that it was PGPed, yet succeed!
>
> Shawn> There are alternatives too.
uuh sorry,
thinking too quickly -- didn't explain properly
I'd generate a list of passwords so they were disposable.
Each file you sent in could be used just once.
PGPing would just hide the length of the password.
So you'd just write a script to gen passwords, write them to disk where
the server could read it, and on to a disk that you bring to work. The
servlet could track it and say ok now I need password #23 for instance.
Shawn
Home |
Main Index |
Thread Index