Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email firstname.lastname@example.org
From: David Luyer (david_luyerpacific.net.au)
Date: Fri Feb 09 2001 - 01:13:13 CST
> > I dont plan to distribute keys. If you have a funny ident trace and a cracker
> > problem and the FBI turn up then I care. You are logging which user did
> > something entirely for my benefit as sysadmin of the source machine, not your
> > own.
> So, it is stored as an encrypted and authenticated blob in the requesting
> machine's logfiles? (The requesting machine can neither decrypt or verify
> the blob?)
> Neat. I _like_ that idea. That would actually be useful.
What was even cuter was a large ISP in Australia who did a transparent reverse
proxy on the ident port to an encrypted version of the username.
This meant that IRC servers could depend on the ident being consistent for
verification of dial-up users identity, and yet IRC users could not identify
other IRC users and harass them (etc).
-- David Luyer Phone: +61 3 9674 7525 Senior Network Engineer P A C I F I C Fax: +61 3 9699 8693 Pacific Internet (Australia) I N T E R N E T Mobile: +61 4 1111 2983 http://www.pacific.net.au/ NASDAQ: PCNTF