Either would be great.
How so?
I mean, I remember writing a shell script that invoked ssh-agent2 (on Solaris) somewhere around 2003. Does that count?
(But I don't have Signal, and the details are foggy by now.)
@dangoodin message sent
I was only a user, but I did a bunch of stupid shit with it at the time.
@dangoodin I think many of the BSD folks on the Fediverse can help with that. Boosted for visibility.
What I do remember, being in Europe, is the cryptographic export restrictions. Officially the RSA public keys were limited to 512 bytes, 3DES and RC4 being unavailable or restricted to 40/56 bits (depending on year). Don't think I ever saw IDEA being used due to the patents.
Similar problems with Kerberos 4 leading to eBones and Heimdall being a non-US implementation of Kerberos 5.
@asmodai
Eh, ssh originated from Finland so it never was subject to export restrictions. The free version, anyway. Can't say for the commercial version, never used it.
Dan, I was in the same university with Tatu during the time he developed it. It became recommended, nearly mandatory tool very quickly.
@dangoodin
@osma @dangoodin Didn't the restrictions still apply to the ciphers used though? I know IDEA was an issue.
It's been 25+ years so I am definitely fuzzy on the keys from back then.
@dangoodin Are you looking for this? https://www.ssh.com/about/history/ It's an advertorial, but it comes from the horses mouth.
At the ISP I cofounded in 1993, we were acutely aware of the risks of shipping passwords in plaintext. In my recollection, the issue with remote terminals was fixed quickly with SSH. We had telnet disabled as soon as we got ssh to work. Fixing mail and other networked apps with SSL/TLS took way longer.
@dangoodin
You should talk to @mwl He literally wrote the book.
https://bookshop.org/p/books/ssh-mastery-openssh-putty-tunnels-and-keys-michael-w-lucas/8134776
Yep. And in the 1990s, I downloaded the RSA libraries to compile early SSH. Could poke you next week if you still need sources.
@dangoodin I was a university sysadmin (University of Toronto) at the time SSH was released, and my memory is that we jumped on it basically immediately because it was clearly better than rsh/rlogin. Not only was it more secure, it also had X forwarding over SSH (a big help if you worked from Unix workstations, as was the case for us) and I think various other conveniences.
(We built it ourselves from source on our Unix machines, as was common at the time.)
@dangoodin Ylรถnen ssh was widely portable, as was customary at the time, and we used it on systems old and new - SunOS 4.1, NextSTEP, Solaris, HP-UX, BSDI BSD/OS, Linux, NetBSD, OpenBSD. I think OpenBSD in particular shipped ssh from the initial release - for the commercial UNIXes it was pretty much the second thing we would put on a new system after bootstrapping a recent GNU toolchain...
Before ssh became known to us, we used a bastion host with TIS FWTK and OTP logins for telnet-gw. It was still unencrypted, but at least it wouldn't give away a reusable password when you connected from the outside over the internet.
I did, relatively extensively and on a variety of operating systems...but my memory is absolute trash, so there's that.
@dangoodin I started using it in 1996 when my Linux PC got hacked along with pretty much every other linux box on the campus dormitory network of my university. It was mostly made up of 10Base-T hubs so sniffing was guaranteed to get you a bunch of clear-text passwords.
SSH was an adjustment but it was much easier to deal with than kerberos, which we needed for imap and other stuff. It also came with cooler features than telnet, which immediately seemed like a naive thing from some early days of a smaller, kinder internet โ a mythical time when people did not hack each other's computers not for technical reasons, but out of a sense of basic respect and politeness.
@dangoodin I did. My first published article was about ssh chroot groups for security focus back in 2001.
Not sure how great my memory is of that time though.
Getting the krb5 patchkit to build on HP-UX was always A Laugh (not actually a laugh)
However, the scrolling LED display of people using (and thus exposing their p/ws) ssh-1 on the camp network at WTH and/or SHA was a laugh.