Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 23 Sep 2004 10:28:59 +0200
From:      Nick Cleaton <nick@cleaton.net>
To:        Dag-Erling Smorgrav <des@des.no>
Cc:        Chris Ryan <chrisryanemail@yahoo.com.au>
Subject:   Re: Attacks on ssh port
Message-ID:  <20040923082859.GL5340@lt1.cleaton.net>
In-Reply-To: <xzp1xgt5rv1.fsf@dwp.des.no>
References:  <20040923045229.GJ5340@lt1.cleaton.net> <20040923070809.14655.qmail@web51010.mail.yahoo.com> <20040923072912.GK5340@lt1.cleaton.net> <xzp1xgt5rv1.fsf@dwp.des.no>

next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, Sep 23, 2004 at 10:09:22AM +0200, Dag-Erling Smorgrav wrote:
> Nick Cleaton <nick@cleaton.net> writes:
> > I want access to my system from any IP address, so I've patched my
> > sshd so that a secret token is required to connect.
[...]
> Look up "replay attack" on google...

Indeed, this doesn't keep out attackers who can sniff a valid session,
just like tcp_wrappers doesn't keep out attackers who can spoof an
authorized source address.


Nick


-- 
$_='YN8KuE***  http://www.exonetric.com/  Telehouse UK colo  ***HARQr**'
.'NfzV0YrC1***     GBP40/month +VAT 40G BW no setup fee     ***MnjJ**'
.'6QvtcPgQ20***                                            ***nlS**'
;s/(.)(.*(.))/$2.chr(32+(ord($1)+ord$3)%89)/euntil/Foo/;eval#****'



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20040923082859.GL5340>