Differences
This shows you the differences between the selected revisions of the page.
2006-06-10 | 2006-06-10 | ||
no summary (84.244.84.34) (hidden) | old revision restored (martin) (hidden) | ||
Line 18: | Line 18: | ||
The actual order of authentication methods is as follows: MIT Kerberos GSSAPI 5 (SSH-2 only), [[public key]] (using Pageant), [[public key]] (using [[ui_login_session|configured file]]), keyboard-interactive (SSH-2 only), TIS or Cryptocard (SSH-1 only), password. | The actual order of authentication methods is as follows: MIT Kerberos GSSAPI 5 (SSH-2 only), [[public key]] (using Pageant), [[public key]] (using [[ui_login_session|configured file]]), keyboard-interactive (SSH-2 only), TIS or Cryptocard (SSH-1 only), password. | ||
- | qqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqq | ||
===== Verifying the Host Key ===== | ===== Verifying the Host Key ===== | ||
Line 56: | Line 55: | ||
exhaustive brute-force attack have been well within the realm of | exhaustive brute-force attack have been well within the realm of | ||
commercial feasibility for some time. | commercial feasibility for some time. | ||
- | ergergargrgergearg | ||
===== SSH Protocols ===== | ===== SSH Protocols ===== | ||
Line 83: | Line 81: | ||
attacks more difficult to execute and by providing less data for | attacks more difficult to execute and by providing less data for | ||
cryptanalysis. | cryptanalysis. | ||
+ |