I thought I had heard or read that telnet can use plug-in authentication methods? On that topic, there was a recent review of a book called _Radius_ about the protocol by that name, on IBM DeveloperWorks: http://www-106.ibm.com/developerworks/library/wi-lounge10.html?ca=dnt-44
DW is a great resource, and covers linux, java, wireless, and prolly most other worthy bu$$words that come around. I suggest it... It would make sense, for a lot of amateur radio packet buffs to use such a system, since the laws require that transmissions be "in the clear", although I'd guess that secure (encrypted) authentication, if used for the Purposes of Good, would be allowed -- I hear lots of people use ssh tunnels over amateur anyway... anyone on the list know about the http://www.valleyradioclub.org/home.htm ?? Their site seems up-to-date. Okay, I give up. Telnet is cool. Much MUCH cooler than floppy disks. Go on with your bad self. In other news: Dell will be giving up floppies: (phew, finally!) http://biz.yahoo.com/ibd/030205/tech_1.html http://slashdot.org/article.pl?sid=03/02/05/1933223 and another interesting /. coincidence: I ranted on this list recently about how indeterminate the # of users behind an IP can be, and the publication of this paper about counting the number of NAT'ed machines: http://www.research.att.com/~smb/papers/fnat.pdf http://slashdot.org/article.pl?sid=03/02/05/2129218 l8rz, Ben B On Wed, 2003-02-05 at 15:28, Cory Petkovsek wrote: > echo "Using Telnet as an authentication protocol over an untrusted > network is insecure. However using the tool '/usr/bin/telnet' is a > great way to connect one's keyboard with a tcp port on an ip address. > It is ancient as far as unix goes, but is not outdated. I would go as > far to say that one cannot be a good network administrator without using > it on occasion. If one is operating without it then one missing part of > one's potential. It will become out dated only when we stop using > connection oriented, text based application protocols (http, smtp, pop3, > imap, ftp, etc..). It can and should be used by sysadmins of all > platforms because they all use those text based protocols. Very often > the logs just don't show enough information and you need to try it > yourself to see what is wrong." > /dev/fd0 > > Cory _______________________________________________ Eug-LUG mailing list [EMAIL PROTECTED] http://mailman.efn.org/cgi-bin/listinfo/eug-lug