Subject: Re: Locating Mac Volumes in the Unix Filesystem...
To: None <fair@clock.org>
From: Marc A. Tamsky <tamsky@as.ucsb.edu>
List: port-mac68k
Date: 09/06/1995 17:54:00
For a replacement r* command package that _is_ secure -- please see:
 http://www.cs.hut.fi/ssh/

>From the intro:

Ssh (Secure Shell) is a program to log into another computer over a
network, to execute commands in a remote machine, and to move files
from one machine to another. It provides strong authentication and
secure communications over insecure channels. Its features include the
following:

       Strong authentication. Closes several security holes (e.g., IP,
routing, DNS spoofing, and listening for passwords from the
network). New authentication methods: .rhosts together with RSA based
host authentication, and pure RSA authentication.

       All communications are automatically and transparently
encrypted. Encryption is also used to protect against spoofed packets.

       X11 connection forwarding provides secure X11 sessions. 

       Arbitrary TCP/IP ports can be redirected over the encrypted
channel in both directions.

       Client RSA-authenticates the server machine in the beginning of
every connection to prevent trojan horses (by routing or DNS spoofing)
and man-in-the-middle attacks, and the server RSA-authenticates the
client machine before accepting .rhosts or /etc/hosts.equiv
authentication (to prevent DNS, routing, or IP spoofing).  An
authentication agent, running in the user's local workstation or
laptop, can be used to hold the user's RSA authentication keys.

       Multiple convenience features fix annoying problems with rlogin
and rsh. 

Ssh is intended as a complete replacement for rlogin and rsh. 

-- 
|   Marc Tamsky      tamsky@as.ucsb.edu               Linux is good.