Skip site navigation (1)Skip section navigation (2)
Date:      Tue, 1 May 2001 16:23:54 -0400
From:      Mipam <mipam@ibb.net>
To:        Alex Popa <razor@ldc.ro>
Cc:        security@FreeBSD.ORG
Subject:   Re: OpenSSH accepts any RSA key from host 127.0.0.1, even on non-default ports
Message-ID:  <20010501162354.A282@bootp-20-219.bootp.virginia.edu>
In-Reply-To: <20010501231616.A40227@ldc.ro>; from razor@ldc.ro on Tue, May 01, 2001 at 11:16:16PM %2B0300
References:  <20010501231616.A40227@ldc.ro>

next in thread | previous in thread | raw e-mail | index | archive | help
On Tue, May 01, 2001 at 11:16:16PM +0300, Alex Popa wrote:
> The reason why this bothers me is that I sometimes use ssh to tunnel ssh
> connections (blowfish encryption in a 3DES tunnel, anyone?)

Some ppl think that using encryption to encrypt allrdy encrypted data
is dubble secure. This is in general certainly not true.
Instead, sometimes it becomes only easier to crack it.
So i wouldnt advice to use ssh in a ssh tunnel to aviod possible
problems like that.
Bye,

Mipam.

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20010501162354.A282>