Date: Thu, 01 Jan 1998 14:31:22 -0800 From: "Randy A. Katz" <randyk@ccsales.com> To: mgraffam@mhv.net, Steve Hovey <shovey@buffnet.net> Cc: questions@FreeBSD.ORG Subject: Re: HACKED (again) Message-ID: <3.0.5.32.19980101143122.02cd5740@ccsales.com> In-Reply-To: <Pine.LNX.3.96.980101152832.28029B-100000@localhost> References: <Pine.BSI.3.95.980101111731.24847F-100000@buffnet11.buffnet.net>
next in thread | previous in thread | raw e-mail | index | archive | help
How do they get that kind of control with ftp? Are there standard exploits? I had removed all anonymous access to that box...guess that wasn't it, eh? > >I dont think this is necessarily a problem with ssh. Ssh's security can >be circumvented through the insecurity of other things that are running, >such as ftp. > >While I havent looked over every line of ssh source, what I have seen >shows good technique against programming glitches that allow root access >through broken suid programs, and the crypto looks fine when compared >against other (trusted) implementations. >
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3.0.5.32.19980101143122.02cd5740>