[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: SSH attack


On Sat, 22 Oct 2005 01:49, Greg Folkert wrote:
> Lately, I have been requiring key-auth just to get a Login prompt, which
> then use a login and password challenge scheme, once that is successful,
> the Login and the key have to matchup as well. IOW, not only do you have
> to have the right Key, but you have to have the right lock to put it
> into, even if it does fit and turn in the wrong lock.
Just out of interest, how did you implement that.

Andrew V.

Reply to: