ssh » Revisions »

Differences

This shows you the differences between the selected revisions of the page.

2006-06-10 2006-06-10
no summary (84.244.84.34) (hidden) old revision restored (martin) (hidden)
Line 18: Line 18:
The actual order of authentication methods is as follows: MIT Kerberos GSSAPI 5 (SSH-2 only), [[public key]] (using Pageant), [[public key]] (using [[ui_login_session|configured file]]), keyboard-interactive (SSH-2 only), TIS or Cryptocard (SSH-1 only), password. The actual order of authentication methods is as follows: MIT Kerberos GSSAPI 5 (SSH-2 only), [[public key]] (using Pageant), [[public key]] (using [[ui_login_session|configured file]]), keyboard-interactive (SSH-2 only), TIS or Cryptocard (SSH-1 only), password.
-qqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqq 
===== Verifying the Host Key ===== ===== Verifying the Host Key =====
Line 56: Line 55:
exhaustive brute-force attack have been well within the realm of exhaustive brute-force attack have been well within the realm of
commercial feasibility for some time. commercial feasibility for some time.
-ergergargrgergearg 
===== SSH Protocols ===== ===== SSH Protocols =====
Line 83: Line 81:
attacks more difficult to execute and by providing less data for attacks more difficult to execute and by providing less data for
cryptanalysis. cryptanalysis.
 +

Last modified: by martin