Date: Sun, 18 Feb 2001 10:02:41 +0000 From: Tony Finch <dot@dotat.at> To: Jan Conrad <conrad@th.physik.uni-bonn.de> Cc: Kris Kennaway <kris@obsecurity.org>, freebsd-security@freebsd.org, Ralph Schreyer <schreyer@th.physik.uni-bonn.de> Subject: Re: Why does openssh protocol default to 2? Message-ID: <20010218100241.M2746@hand.dotat.at> In-Reply-To: <Pine.BSF.4.33.0102161442540.51347-100000@merlin.th.physik.uni-bonn.de> References: <20010215133000.A12807@mollari.cthul.hu> <Pine.BSF.4.33.0102161442540.51347-100000@merlin.th.physik.uni-bonn.de>
next in thread | previous in thread | raw e-mail | index | archive | help
Jan Conrad <conrad@th.physik.uni-bonn.de> wrote: > >I mean I just checked some University systems running ssh2 and ssh1 and I >found really *lots* of keys in NFS mounted users homes... (sometimes 10% >of the users had keys in their homes....) If the users don't encrypt their ssh keys then they deserve to lose. That doesn't make ssh2 less secure than ssh1. Tony. -- f.a.n.finch fanf@covalent.net dot@dotat.at To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010218100241.M2746>