Date: Fri, 5 Jan 2001 13:25:13 -0700 (MST) From: "David G. Andersen" <dga@pobox.com> To: matrix@ipform.ru (Artem Koutchine) Cc: dga@pobox.com (David G. Andersen), security@FreeBSD.ORG, questions@FreeBSD.ORG Subject: Re: Antisniffer measures (digest of posts) Message-ID: <200101052025.NAA01074@faith.cs.utah.edu> In-Reply-To: <002f01c07753$af808400$0c00a8c0@ipform.ru> from "Artem Koutchine" at Jan 05, 2001 11:11:25 PM
next in thread | previous in thread | raw e-mail | index | archive | help
Lo and behold, Artem Koutchine once said:
> >
> > IPsec. IPsec. IPsec. FreeBSD, Linux, Win2k support it. Don't know
> > about MacOS. Doubt it until OSX, but I could be wrong. This is the
> > better solution.
>
> Well, then i need IPSec for WIn9x, NT 4.x and ME too. Is there?
I don't know. You're asking on the FreeBSD mailing lists.
> > A final solution is simply to encrypt all sensitive traffic at the
> > application layer. Use SSL for http/pop3/etc. Use SSH for remote
> > access. Etc. Not perfect, but works.
>
> Nope, dsniff breaks SSL and SSH1.
Dsniff helps break improperly used and configured SSL and SSH. As a
blanket statement, what you said is incorrect. If you securely distribute
the public keys of the other machines to /etc/ssh/ssh_known_hosts{2}
and set StrictHostKeyChecking, you'll be fine, unless you have users who
deliberately try to circumvent security. But that's a different problem
entirely.
-Dave
--
work: dga@lcs.mit.edu me: dga@pobox.com
MIT Laboratory for Computer Science http://www.angio.net/
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-questions" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200101052025.NAA01074>
