lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <E1Gcopy-0003Sa-00@ixion.tartarus.org>
Date: Wed, 25 Oct 2006 20:54:54 +0100
From: Simon Tatham <anakin@...ox.com>
To: Matthew Flaschen <matthew.flaschen@...ech.edu>
Cc: full-disclosure@...ts.grok.org.uk
Subject: Re: RE : Putty Proxy
	login/password	discolsure....(Answer from PUTTY Staff)

Matthew Flaschen <matthew.flaschen@...ech.edu> wrote:

> Could use the same passphrase for the proxy password and SSH keys?

Only works if you _are_ entering a passphrase for the SSH key; if
you're using password authentication, a passphraseless key, the SSH
agent, or connecting to a server which doesn't ask for SSH-level
authentication at all, you're back to square one. This isn't a
general solution.

Cheers,
Simon
-- 
for k in [pow(x,37,0x13AC59F3ECAC3127065A9) for x in [0x195A0BCE1C2F0310B43C,
0x73A0CE584254AB23D5A0, 0x12878657EA814421CC92, 0x7373445BB3DA69996F4A,
0x77A7ED5BC3AA700E80B2, 0xE9C71C94ED87ADCF7367, 0xFE920395F414C1A5DB50]]:
 print "".join([chr(32+3*((k>>x)&1))for x in range(79)]) # <anakin@...ox.com>

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ