From owner-freebsd-hackers Wed Jun 30 4:33: 2 1999 Delivered-To: freebsd-hackers@freebsd.org Received: from adelphi.physics.adelaide.edu.au (adelphi.physics.adelaide.edu.au [129.127.36.247]) by hub.freebsd.org (Postfix) with ESMTP id 28B0D15259 for ; Wed, 30 Jun 1999 04:32:57 -0700 (PDT) (envelope-from kkennawa@physics.adelaide.edu.au) Received: from bragg (bragg [129.127.36.34]) by adelphi.physics.adelaide.edu.au (8.8.8/8.8.8/UofA-1.5) with SMTP id VAA16803; Wed, 30 Jun 1999 21:02:38 +0930 (CST) Received: from localhost by bragg; (5.65/1.1.8.2/05Aug95-0227PM) id AA32353; Wed, 30 Jun 1999 21:02:36 +0930 Date: Wed, 30 Jun 1999 21:02:36 +0930 (CST) From: Kris Kennaway X-Sender: kkennawa@bragg To: "Matthew N. Dodd" Cc: Julian Elischer , Bob Bishop , Peter Jeremy , hackers@freebsd.org Subject: Re: tcpdump(1) additions. In-Reply-To: Message-Id: Mime-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-hackers@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG On Wed, 30 Jun 1999, Matthew N. Dodd wrote: > > It would make sense except that the last time someone tried, some people > > complained that it made it too easy to sniff passwords etc. > > Thats such a bogus issue. The argument (to me) is not one of capability, but expediency. If you're running a tcpdump which includes telnet traffic and someone logs in, their password goes floating past in front of your eyes (and anyone else who is watching). Most of us can't read hex-encoded ascii strings, so the passswords aren't apparent to the (witting or unwitting) casual observer. But on the other hand it would certainly have its uses, so including this with the default being the current hex dump seems fine to me. Kris ----- "Never criticize anybody until you have walked a mile in their shoes, because by that time you will be a mile away and have their shoes." -- Unknown To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message