| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
| |
telnet, so it was treated as the reference code, except where later
commits were made to "base" telnet.
|
| |
|
| |
|
|
|
|
| |
(potentially) not responding to an invalid SRA 'auth is' message.
|
|
|
|
| |
same time simplify, the random number selection code.
|
|
|
|
|
|
|
| |
(512) are a little distressing, but the method really needs to be
extended to allow server-supplied DH parameters anyway.
Submitted by: kris
|
|
|
|
|
|
| |
low-memory situations.
Submitted by: kris
|
|
|
|
|
| |
insecure, do not succeed. Copied from login.c. This functionality really
should be a PAM module.
|
| |
|
|
|
|
|
| |
I just mistakenly commited this to RELENG_4. I have contacted Jordan to see
about how to fix this. Pass the pointy hat.
|
| |
|
|
|
|
| |
PR# 19835
|
| |
|
| |
|
|
|
|
| |
going to have to figure something else out.
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
| |
SRA does a Diffie-Hellmen exchange and then DES-encrypts the
authentication data. If the authentication is successful, it also
sets up a session key for DES encryption.
SRA was originally developed at Texas A&M University.
This code is probably export restricted (despite the fact that I
originally found it at a University in Germany).
SRA is not perfect. It is vulnerable to monkey-in-the-middle attacks
and does not use tremendously large DH constants (and thus an individual
exchange probably could be factored in a few days on modern CPU
horsepower). It does not, however, require any changes in user or
administrative behavior and foils session hijacking and sniffing.
The goal of this commit is that telnet and telnetd end up in the DES
distribution and that therefore an encrypted session telnet becomes
standard issue for FreeBSD.
|
|
|
|
| |
curses/termcap/terminfo implementations and causes recursion.
|
| |
|
|
telnet, and after userland diffs have been merged in, will be used to
build the non-kerberised sources as well. (See unifdef(1) for details)
|