• Subject: Re: Newbie question
  • From: "Alex Brainman" <brainman@xxxxxxxxxxxxx>
  • Date: Fri, 1 Oct 1999 13:16:16 +1000

----- Original Message -----
From: Eric Strovink <strovink@acm.org>
To: <LINUX5250@midrange.com>
Cc: <infosys@klements.com>
Sent: Friday, 1 October 1999 5:48
Subject: Re: Newbie question

> Plus, the same person indicated that there is already
> encrypted password authentication built into the (newest - 1) version of
> AS/400 telnet server.  You can read some RFC's that propose that
> (links on the tn5250 developer site).  Obviously things have progressed
> the proposal stage.

As you said "Proposed Internet Draft RFC 1205"
specify an "encrypted password authentication", that can be used
to authenticate user without him sending his password (whether in
clear or not) over the wire.

As far as I'm aware, Client Access doesn't support the option, but
AS/400 telnet server does. I state that, because I've implemented the
option myself and it's working fine on our old AS/400 V3R2.

BTW, the option does not encrypt any traffic of your session so while
protecting you password (with DES level security) it doesn't provide
any protection for your session data ...


| This is the LINUX5250 Mailing List!
| To submit a new message, send your mail to LINUX5250@midrange.com.
| To subscribe to this list send email to LINUX5250-SUB@midrange.com.
| To unsubscribe from this list send email to LINUX5250-UNSUB@midrange.com.
| Questions should be directed to the list owner/operator: david@midrange.com

As an Amazon Associate we earn from qualifying purchases.

This thread ...


Follow On AppleNews
Return to Archive home page | Return to MIDRANGE.COM home page

This mailing list archive is Copyright 1997-2022 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].

Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.