Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 01 Jan 1998 14:31:22 -0800
From:      "Randy A. Katz" <randyk@ccsales.com>
To:        mgraffam@mhv.net, Steve Hovey <shovey@buffnet.net>
Cc:        questions@FreeBSD.ORG
Subject:   Re: HACKED (again)
Message-ID:  <3.0.5.32.19980101143122.02cd5740@ccsales.com>
In-Reply-To: <Pine.LNX.3.96.980101152832.28029B-100000@localhost>
References:  <Pine.BSI.3.95.980101111731.24847F-100000@buffnet11.buffnet.net>

next in thread | previous in thread | raw e-mail | index | archive | help
How do they get that kind of control with ftp? Are there standard exploits?
I had removed all anonymous access to that box...guess that wasn't it, eh?


>
>I dont think this is necessarily a problem with ssh. Ssh's security can
>be circumvented through the insecurity of other things that are running,
>such as ftp.
>
>While I havent looked over every line of ssh source, what I have seen
>shows good technique against programming glitches that allow root access
>through broken suid programs, and the crypto looks fine when compared
>against other (trusted) implementations.
>




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3.0.5.32.19980101143122.02cd5740>