On 17 Nov 2001, richard wrote:

> It pretty obvioud that the use of encrytion is badly understood.
>
> If you send an encrypted password the other end must have the capability
> of de-encryption...
>
> Now surely that's a straight forward thing for some people to understand
> ??

Key sharing???  Seems to be a widely understood topic IMO.

> hoew do you install ssh on a unix network when you dont have root access
> ?

It seems to me that any person in a position of administrating or securing
3 continents worth of servers either has root access already, or can find
the person who does in a few minutes.

> And even if you did , it will not go through a proxy server that is very
> remote, and has to be logged into..

Not sure why the distance has anything to do with it, but just for
clarification why would you require a login to a proxy server for
something like an SSH session?  You're right though -- SSH cannot go through a
proxy, since the encryption is only usable between the two end hosts.  A
proxy that might somehow re-encrypt that with a different key would likely
break the connection.  NAT is probably your best bet here, or creating
site-to-site IPsec VPN tunnels.

> OK I'll go one stage further in words you might understand
>
>
> ITS BLOODY IMPOSSIBLE

I highly doubt that.  Your solution, whatever it winds up being, may have
to be a bit creative because of your unusual requirements.  Be that as it
may, this won't take a cookie-cutter approach to solve.  But it sure isn't
bloody impossible.

I don't have the original post on this computer anymore and am picking
this up from the last few replies.  (the archives are only current to the
12th for some reason.)  So, sorry if I missed something here, but maybe
this will help.

-rf




Want to buy your Pack or Services from MandrakeSoft? 
Go to http://www.mandrakestore.com

Reply via email to