Differences
This shows you the differences between the selected revisions of the page.
| 2006-06-10 | 2006-06-10 | ||
| no summary (84.244.84.34) (hidden) | old revision restored (martin) (hidden) | ||
| Line 18: | Line 18: | ||
| The actual order of authentication methods is as follows: MIT Kerberos GSSAPI 5 (SSH-2 only), [[public key]] (using Pageant), [[public key]] (using [[ui_login_session|configured file]]), keyboard-interactive (SSH-2 only), TIS or Cryptocard (SSH-1 only), password. | The actual order of authentication methods is as follows: MIT Kerberos GSSAPI 5 (SSH-2 only), [[public key]] (using Pageant), [[public key]] (using [[ui_login_session|configured file]]), keyboard-interactive (SSH-2 only), TIS or Cryptocard (SSH-1 only), password. | ||
| - | qqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqq | ||
| ===== Verifying the Host Key ===== | ===== Verifying the Host Key ===== | ||
| Line 56: | Line 55: | ||
| exhaustive brute-force attack have been well within the realm of | exhaustive brute-force attack have been well within the realm of | ||
| commercial feasibility for some time. | commercial feasibility for some time. | ||
| - | ergergargrgergearg | ||
| ===== SSH Protocols ===== | ===== SSH Protocols ===== | ||
| Line 83: | Line 81: | ||
| attacks more difficult to execute and by providing less data for | attacks more difficult to execute and by providing less data for | ||
| cryptanalysis. | cryptanalysis. | ||
| + | |||