Date: Sat, 19 May 2007 17:42:43 -0400 From: "Arvee Klesk" <arvee.klesk@gmail.com> To: "UNIX - questions" <freebsd-questions@freebsd.org> Subject: SSH question (some kind off-topic) Message-ID: <001201c79a5e$e7d52f60$1555a8c0@bloodlust>
next in thread | raw e-mail | index | archive | help
Hi list. When a password is send (via a POP3 session without SSL, or without establishing a secure connection) it can be retrieved by the ISP, or somebody ahead, right. AFAIK, making an SSH session to a server and forwarding, for instance, port 110 (POP3) to the SSH session, or some other port / application, passwords and / or traffic cannot be retrieved as easy by proxy servers or sniffers. So my question is what happens in the SSH server then, the traffic can be analyzed on that side? Really I don't know what happens when traffic reach the SSH server and keep their way. Thanks in advance. Please reply-me directly, I have delivery disabled some time.
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?001201c79a5e$e7d52f60$1555a8c0>