On 17 Nov 2001, richard wrote: > It pretty obvioud that the use of encrytion is badly understood. > > If you send an encrypted password the other end must have the capability > of de-encryption... > > Now surely that's a straight forward thing for some people to understand > ??
Key sharing??? Seems to be a widely understood topic IMO. > hoew do you install ssh on a unix network when you dont have root access > ? It seems to me that any person in a position of administrating or securing 3 continents worth of servers either has root access already, or can find the person who does in a few minutes. > And even if you did , it will not go through a proxy server that is very > remote, and has to be logged into.. Not sure why the distance has anything to do with it, but just for clarification why would you require a login to a proxy server for something like an SSH session? You're right though -- SSH cannot go through a proxy, since the encryption is only usable between the two end hosts. A proxy that might somehow re-encrypt that with a different key would likely break the connection. NAT is probably your best bet here, or creating site-to-site IPsec VPN tunnels. > OK I'll go one stage further in words you might understand > > > ITS BLOODY IMPOSSIBLE I highly doubt that. Your solution, whatever it winds up being, may have to be a bit creative because of your unusual requirements. Be that as it may, this won't take a cookie-cutter approach to solve. But it sure isn't bloody impossible. I don't have the original post on this computer anymore and am picking this up from the last few replies. (the archives are only current to the 12th for some reason.) So, sorry if I missed something here, but maybe this will help. -rf
Want to buy your Pack or Services from MandrakeSoft? Go to http://www.mandrakestore.com
