Berkeley CSUA MOTD:Entry 19179
Berkeley CSUA MOTD
 
WIKI | FAQ | Tech FAQ
http://csua.com/feed/
2025/07/08 [General] UID:1000 Activity:popular
7/8     

2000/9/6-7 [Computer/SW/Security] UID:19179 Activity:nil
9/6     Does anyone know if there's an SSH extension for Windows Telnet?
        I'm having trouble with the Whacked out Java SSH.  It can't run
        well when using Pine or Pico.  Sorry if this screen looks messed
        up.  I can't see what I'm typing in Pico. --pcjr
        \_ dont fucking use pine or pico.
        \_ F-Secure SSH
        \_ http://www.zip.com.au/~roca/ttssh.html
ERROR, url_link recursive (eces.Colorado.EDU/secure/mindterm2) 2025/07/08 [General] UID:1000 Activity:popular
7/8     

You may also be interested in these entries...
2012/8/26-11/7 [Computer/SW/Security] UID:54465 Activity:nil
8/26    Poll: how many of you pub/priv key users: 1) use private keys that
        are not password protected 2) password protect your private keys
        but don't use ssh-agent 3) use ssh-agent:
        1) .
        2) ..
        3) ...
	...
2012/8/29-11/7 [Computer/SW/Security] UID:54467 Activity:nil
8/29    There was once a CSUA web page which runs an SSH client for logging
        on to soda.  Does that page still exist?  Can someone remind me of the
        URL please?  Thx.
        \_ what do you mean? instruction on how to ssh into soda?
           \_ No I think he means the ssh applet, which, iirc, was an applet
              that implemented an ssh v1 client.  I think this page went away
	...
2011/4/27-7/30 [Computer/SW/Security, Computer/SW/Unix] UID:54096 Activity:nil
4/28    Will wall be fixed?   - jsl
        \_ What's wall?
           \_ An anachronism from a bygone era, when computers were hard to
              comeby, the dorms didn't have net, there was no airbears, and
              when phones didn't come standard with twitter or sms.
           \_ A non useful implementation of twitter.
	...
2009/7/8-16 [Computer/SW/OS/Linux, Computer/SW/Unix] UID:53124 Activity:nil
7/7     what happened to our web presence? http://www.csua.berkeley.edu
        not working
    \_ That would be because we've yet to set them up afaik. Steven *does* have
    a job after all. The idea is that we want a separate computer mounting the
    web directories, so that if an exploit compromises the webserver, the shell
    server (soda) itself will be insulated from the attack.
	...
2009/6/29-7/3 [Computer/SW/Security] UID:53083 Activity:low 53%like:53089
6/28    Hello everyone,
Logins to soda are back open.  The new ssh key is
2048 4b:96:67:18:27:da:XX:XX:XX:XX:XX:XX:XX:XX:XX:XX
Please allow public key authentication since it is more secure
than plain password. Also if you see this posting, it means
anybody could have posted the annoucement.  Because  the
	...
2009/6/29-7/3 [Computer/SW/Security] UID:53089 Activity:nil 53%like:53083
6/29    Please allow public key authentication since it is more
        secure than plain password.  If you see this posting, it
        means anybody could have posted the annoucement.  Because
        the official csua web site is still down., this makes it a
        little suspicious to the truly paranoid.
        p.s.  this web entry format is counter intuitive.  And how come
	...
2009/2/10-13 [Computer/SW/Security, Computer/SW/Unix] UID:52552 Activity:nil
2/10    I have an sh file that does a mount.. the mount does an
        authentication. I previosly stored the username and password
        from zenity prompts. However, I can't get a return on the password
        field. The following only works on the username:
        mount -t davfs "http://blahblah.com/BLahUser11" /mountdir << EOF
        ${username}
	...
2009/1/15-23 [Computer/SW/Languages/Java, Computer/SW/Security] UID:52394 Activity:nil
1/15    http://cwe.mitre.org/top25
        2009 CWE/SANS Top 25 Most Dangerous Programming Errors
        \_ "Avoid inconsistent messaging that might accidentally tip off
           an attacker about internal state, such as whether a username
           is valid or not."  Really?  Fuck you buddy.  I don't always
           remember what my goddamn username was on your stupid fucking
	...
Cache (3504 bytes)
www.zip.com.au/~roca/ttssh.html
This version provides some protection against traffic analysis by padding the transmitted SSH password with NULs. Only one of them affects TTSSH: 11 a vulnerability using IDEA. Therefore, it is now completely legal to use the standard "international" TTSSH package within the USA. This means anyone is now free to do almost anything they want with the source code. I've released the new version because I don't like depending on luck (and it should make some of the forwarding features work again). This includes several bug fixes and TIS authentication (thanks to Dean Thompson for help with that). I just don't have the resources to do it, especially since I can only work on it during the few weeks each year I'm outside the US, and that time is important to me for other reasons. I'd be happy for someone else to pick up the code and add it :-). I've fixed most of the known bugs, added proper support for X forwarding and UI for all the forwarding options, and added a couple of other doodads ("/ssh-autologin" option, in particular --- see the 14 documentation page for details. Also, it looks like it will be hard to integrate all its features into Teraterm without significantly modifying the design of the main Teraterm application. There's no way I'll have enough time overseas in the foreseeable future to undertake this project, sorry. Note that, due to an oversight, the version number in the file was not updated. Since I'm returning to the USA tomorrow, this will be the last release for several months unless an overseas maintainer is found. Non-SSH sessions used to crash at the end of the session. I released the debug version by mistake and it didn't work for many people. How to Obtain and Install TTSSH Currently TTSSH is only available for Win32 platforms (Windows 95 and NT). Again, I don't have the tools to compile it anywhere else, and someone else may be able to help. The following instructions will also serve to update an old version of TTSSH. The latest build of TTSSH requires this (this was an error in the build process, sorry). How to Use TTSSH There is now a 21 TTSSH documentation page. What the Government Wants You to Know This code contains cryptographic software covered by US ITAR regulations and by the laws of various countries. Its distribution and use may be restricted by these laws and regulations. In particular, it is probably illegal to make the binary code publically available at a US site. What I Want You to Know All the usual free software legalese applies. The software is provided entirely "as is", and use is entirely at the discretion and risk of the user. Who to Thank * This code started with Ian Goldberg's Top Gun SSH for the Pilot. The LIBEAY32 used by TTXSSH is a plain "out-of-the-box" build. That library is 1995-1996 Jean-loup Gailly and Mark Adler. Mileage with other platforms may vary, but I'm interested in getting bug reports. However, please only send me bug reports for the latest version of TTSSH! Known bugs: * Sometimes the remote host will disconnect and the window will not close even if you've specified "close window on disconnect". This happens when a dialog box or message box is showing when the disconnect is detected. This is actually a Teraterm "feature", and there's nothing I can do about it. What the Terms and Conditions Are You can download and use TTSSH for absolutely free. Note that the terms for the source package are a bit looser, so if you build your own version of TTSSH then you have even more rights.