From owner-freebsd-questions@FreeBSD.ORG Sun May 20 02:37:31 2007 Return-Path: X-Original-To: freebsd-questions@freebsd.org Delivered-To: freebsd-questions@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [69.147.83.52]) by hub.freebsd.org (Postfix) with ESMTP id 1BE8916A41F for ; Sun, 20 May 2007 02:37:31 +0000 (UTC) (envelope-from hunteke@earlham.edu) Received: from sipala.earlham.edu (sipala.earlham.edu [159.28.1.75]) by mx1.freebsd.org (Postfix) with ESMTP id DC43413C45A for ; Sun, 20 May 2007 02:37:30 +0000 (UTC) (envelope-from hunteke@earlham.edu) Received: from [192.168.2.101] (74-132-13-58.dhcp.insightbb.com [74.132.13.58]) (authenticated bits=0) by sipala.earlham.edu (8.13.6/8.13.6) with ESMTP id l4K2bPmi016064 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NO); Sat, 19 May 2007 22:37:30 -0400 (EDT) X-Authentication-Warning: sipala.earlham.edu: Host 74-132-13-58.dhcp.insightbb.com [74.132.13.58] claimed to be [192.168.2.101] In-Reply-To: <001201c79a5e$e7d52f60$1555a8c0@bloodlust> References: <001201c79a5e$e7d52f60$1555a8c0@bloodlust> Mime-Version: 1.0 (Apple Message framework v752.3) X-Priority: 3 Content-Type: text/plain; charset=US-ASCII; delsp=yes; format=flowed Message-Id: <1564C519-94D8-4827-9E19-863336A767DF@earlham.edu> Content-Transfer-Encoding: 7bit From: Kevin Hunter Date: Sat, 19 May 2007 22:36:58 -0400 To: "Arvee Klesk" X-Mailer: Apple Mail (2.752.3) Cc: FreeBSD Questions List Subject: Re: SSH question (some kind off-topic) X-BeenThere: freebsd-questions@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: User questions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 20 May 2007 02:37:31 -0000 At 5:42p -0400 on 19 May 2007, Arvee Klesk wrote: > Hi list. When a password is send (via a POP3 session without SSL, > or without > establishing a secure connection) it can be retrieved by the ISP, or > somebody ahead, right. AFAIK, making an SSH session to a server and > forwarding, for instance, port 110 (POP3) to the SSH session, or > some other > port / application, passwords and / or traffic cannot be retrieved > as easy > by proxy servers or sniffers. > > So my question is what happens in the SSH server then, the traffic > can be analyzed on that side? Really I don't know what happens when > traffic reach the SSH server and keep their way. Sounds like your asking "How does ssh work?" I'm not sure at what level you're asking this question, but let me point you to a couple of websites and perhaps you can figure out what you need, or come back with a more direct question. http://en.wikipedia.org/wiki/Public-key_cryptography http://www.linuxforums.org/forum/linux-security/53254-how-does-ssh- exactly-work.html You might also Google for the keywords "trusting trust" and "Ken Thompson" HTH, Kevin