Berkeley CSUA MOTD:Entry 14410
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2024/11/23 [General] UID:1000 Activity:popular
11/23   

1998/7/29-30 [Computer/SW/Unix] UID:14410 Activity:nil
7/29    Our Kerberos logins allow us to connect to and from any computers
        in the cs/eecs domain.  Can you use Kerberos to connect to and
        from other computers (ie. say I wanted to connect to the cs/eecs
        machines from my home computer through home ip.  how do i do that
        with kerberos?)
        \_ Dump kerberos.  Use ssh.
           \_ what are the advantages of kerberos over s(sh/login/cp)?
                \_ not many.  kerberos was around first, but ssh is more
                   useful.  one of the few advantages is kerberos can be
                   used to secure NFS connections, but the EECS/CS dept.
                   doesn't do that.
                        \-often what is more relevant thanthe "advantages
                        and disads" is kerberos is something that needs
                        kind of an institutional buy in, while ssh is much
                        more of a "self-help" product ... a little bit like
                        say AFS vs NFS. --psb
            \_ kerberos doesn't work well across the boundaries of kerberos
               domains.  Like, for example, to/from you home computer.
               ssh does.
2024/11/23 [General] UID:1000 Activity:popular
11/23   

You may also be interested in these entries...
2007/4/7-10 [Computer/SW/Unix] UID:46230 Activity:nil
4/7     Dear VMWare users. I just want to post this because I spent an
        entire day trying to find out why my Ubuntu 2.6.18 has a serious
        time drift problem on host WinXP Pro. The problem is that even
        when you run vmware-tools and sync the time between your VM and
        your host, there is still a delay-- vmware-tools syncs every once
        in a while, and since my VM is so slow it doesn't catch up and
	...
2003/7/24 [Computer/SW/Unix] UID:29129 Activity:nil
7/24    Related to the recent LANMANAGER password attacks:
        Vulnerabilities in Win2k kerberos authentication.
        http://www.hut.fi/~autikkan/kerberos           -John
        \_ I've decided it doesn't matter anymore.  If you run windows you
           just have to assume the whole thing is broken top to bottom and
           the rest is just details.
	...
2003/2/16-17 [Computer/SW/OS/OsX] UID:27431 Activity:kinda low
2/15    I have three computers at home, all running some *nix (2 OS X + linux
        if this matters).  I would like them to have the same basic system
        config. and user accounts for members of my family and friends.  How
        do I automate this?  I know this is a very basic sys admin job but
        I am just a home user and do want to spend too much time learning or
        doing things to become a home sys admin of sort or buying extra
	...
2002/7/2-4 [Computer/SW/Unix] UID:25268 Activity:very high
7/2     Does it make sense to run NFS without NIS/NIS+? I've heard that file
        permissions won't work if you're running NFS w/o NIS.
        \_ nfs can run perfectly fine w/o NIS... thers not dependancy
           either way.. the file perm shit is dumb and wrong or you badly
           misunderstood... blah why do i post in the motd? -shac
           \_ It's good that you post on the motd. Not the dumbass posters
	...
2002/2/22 [Computer/SW/Security, Computer/SW/Unix] UID:23943 Activity:very high
2/21    My moronic boss asked me to write a batch file to auomate a telnet
        session and one requirement is it should not ask user for the
        password.  How do I kindly tell him that he is an idiot?
        \_ setup ssh with passwordless public key or host-based authentication,
           symlink telnet to ssh and let him believe that the users are using
           telnet ;p
	...
2000/7/28-29 [Computer/SW/Security] UID:18808 Activity:kinda low
7/28    What are the security implications of using a network time server?
        \_ If someone nasty can control your clock precisely it may make it
           easier for them to guess the values that will be generated by
           psuedo-random algorithms seeded with the current time.  If those
           are used to form keys or such, security may be weakened.  However,
           many security protocols, such as Kerberos & NIS+, require computers
	...
2000/2/11-13 [Computer/SW/Languages/C_Cplusplus, Computer/SW/OS/FreeBSD] UID:17493 Activity:high
2/11    Responce to C, C++, new grad, love for comp sci, love for $$$, 1 word:
              \_ The smart ones learn to spell or run a spell checker.
                \_ And how to count words.
        The dumb and greedy ones work in the industry
        \_ think C++, Bell Labs.
                \_ C++ is a perfect example of industry stupidity.
	...
2000/1/30-2/1 [Computer/SW/OS/FreeBSD] UID:17375 Activity:nil
1/30    Let's say I want to run an IMAP server from my BSD box at home, but
        I want something like SSL, Kerberos (or ???) for better security.
        Any suggestions/tips on what software to choose? What is easier to
        set up or better to use?  Thanks.
        \_ Use UW IMAP server and sslwrap or stunnel.  All of the parts are
           in ports, you just have to put them together.  --dbushong
	...
1999/1/6-7 [Computer/SW/Unix] UID:15179 Activity:high
1/5     Where can I grab kerberos for an irix machine?
        \_ this question shows a lack of conceptual understanding.
                \_ Then pray tell, oh enlightened one, where did I
                   stray from my path?
                \_ where you decided what you need instead of telling us
                   what you're trying to accomplish
	...
1998/12/19-20 [Computer/SW/Unix] UID:15129 Activity:moderate
12/18   in an .rhosts file how do you give access to your account for
        multiple computers on the same subdomain (like all the computers
        that end with http://cs.berkeley.edu without having the specifiy every
        computer in soda hall)
        \_ Don't be stupid.  This is painfully wrong.  Do not do this.
           Use ssh and setup an authorized keys file.
	...
1998/9/23-24 [Computer/SW/Security] UID:14655 Activity:high
9/22    Any chance of getting ssh2 installed? not clobber ssh1, but just
        have ssh2 available so that we might be able to access other
        systems, pretty please? I'll do it if you gimme the root passwd!
        \_ You don't need to be root.  Just compile it in your home directory
           and delete the source tree once you'r done.  The README tells you
           how to do it.  Or better, put it in some shared directory so
	...