Date: Thu, 4 Jan 2001 03:29:32 -0800 (PST) From: opentrax@email.com To: tech@openbsd.org Cc: tech-security@netbsd.org, freebsd-security@freebsd.org Subject: The Talk: ssh - are you nuts!?! Message-ID: <200101041129.DAA00395@spammie.svbug.com>
next in thread | raw e-mail | index | archive | help
SSH - are you nuts!?! by Jesus Monroy, Jr. I'm too tired to get this out, but i promised it would be available, so here it is. The Offical Part ---------------- On Jan. 4, 2001, a talk entitled "ssh - are you nuts!?!" will be given at the SVBUG (Silicon Valley BSD User Group) monthly meeting by Club President Jesse Monroy, Jr. Details available at: http://www.svbug.com/events/ My part ------- Today at 7:45pm (local time) this talk will start. People say I'm nuts, sometimes I think they are right. Currently, I've heard hundreds of points of views, read dozens of papers, and comtemplated solutions with vicious circles. Two days before Christmas I related this to my brother-in-law, a Havard/Yale/Cambridge MBA. His response was, "Builds character."; hmm.. Thanks. Other club presidents ask me, "Are you serious about this?" My business partner expressed, just after Christmas, "Is this worth it?" I'll admit, at times, this whole thing has been a bit crazy. So as I've said today at 7:45pm local time, here in Silicon Valley, I will be speaking. The title is "SSH - are you nuts!?!" What do I mean by this? Well to get exactly what I mean you may: 1) Come to the talk. Details are available at: http://www.svbug.com/events/ 2) See my notes after the talk - posted to: http://www.svbug.com/past/ 3) Or see the event with on-line video when it's available later this year. For those you you interested, below are selected points from my talk. ------------------------------------------------------------------- -What I won't be saying -SSH is evil. -SSH is useless. -SSH is a bad idea. -Authentication/Encryption is a hoax or does not work. -Public Key Encryption does not work. (I have no proof.) -I can break Public Key Encryption. (At least, not now.) -I USE SSH. (1 or 2) -I never intend to use SSH. -My systems have never been compromised. -My frame of reference -What I will be saying -Voice my personal complaints -Expose encryption/security myths -Investigate the technical specs/issues -Investigage Technical, Social, Economic, Financial Problems -Investigate attackers and attacks -Tell you where to get SSH -Showing alternatives -Why I'm doing this -My Personal Complaints -What people have to say -SSHv1 vs. SSHv2 -SSHv2 Features -The SSH Specs (the problems within) -Authentication/Encryption - Two methods to argue -can never be broken -can always be broken -SSH(v2) Faults -New Technical problems it creates -Technical Problems outside of SSH control -There are common misconceptions about it's functionality -Social Problems -Economic Problems -Financial Problems -Still Subject to ... -Who wants your data -What is the Man-In-The-Middle -Your Governments Involvement -What SSH programs there are -What alternatives you have -Start with a Strategem -Technical Prevention -Technical Counter Measures -Last words To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200101041129.DAA00395>