Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 19 May 2007 17:42:43 -0400
From:      "Arvee Klesk" <arvee.klesk@gmail.com>
To:        "UNIX - questions" <freebsd-questions@freebsd.org>
Subject:   SSH question (some kind off-topic)
Message-ID:  <001201c79a5e$e7d52f60$1555a8c0@bloodlust>

next in thread | raw e-mail | index | archive | help
Hi list. When a password is send (via a POP3 session without SSL, or without
establishing a secure connection) it can be retrieved by the ISP, or
somebody ahead, right. AFAIK, making an SSH session to a server and
forwarding, for instance, port 110 (POP3) to the SSH session, or some other
port / application, passwords and / or traffic cannot be retrieved as easy
by proxy servers or sniffers.

So my question is what happens in the SSH server then, the traffic can be 
analyzed on that side? Really I don't know what happens when traffic reach 
the SSH server and keep their way.


Thanks in advance.

Please reply-me directly, I have delivery disabled some time.




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?001201c79a5e$e7d52f60$1555a8c0>