Date: Thu, 23 Sep 2004 10:28:59 +0200 From: Nick Cleaton <nick@cleaton.net> To: Dag-Erling Smorgrav <des@des.no> Cc: Chris Ryan <chrisryanemail@yahoo.com.au> Subject: Re: Attacks on ssh port Message-ID: <20040923082859.GL5340@lt1.cleaton.net> In-Reply-To: <xzp1xgt5rv1.fsf@dwp.des.no> References: <20040923045229.GJ5340@lt1.cleaton.net> <20040923070809.14655.qmail@web51010.mail.yahoo.com> <20040923072912.GK5340@lt1.cleaton.net> <xzp1xgt5rv1.fsf@dwp.des.no>
next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, Sep 23, 2004 at 10:09:22AM +0200, Dag-Erling Smorgrav wrote: > Nick Cleaton <nick@cleaton.net> writes: > > I want access to my system from any IP address, so I've patched my > > sshd so that a secret token is required to connect. [...] > Look up "replay attack" on google... Indeed, this doesn't keep out attackers who can sniff a valid session, just like tcp_wrappers doesn't keep out attackers who can spoof an authorized source address. Nick -- $_='YN8KuE*** http://www.exonetric.com/ Telehouse UK colo ***HARQr**' .'NfzV0YrC1*** GBP40/month +VAT 40G BW no setup fee ***MnjJ**' .'6QvtcPgQ20*** ***nlS**' ;s/(.)(.*(.))/$2.chr(32+(ord($1)+ord$3)%89)/euntil/Foo/;eval#****'
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20040923082859.GL5340>