Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 20 Jan 2000 07:51:51 +0100
From:      Harold Gutch <logix@foobar.franken.de>
To:        sen_ml@eccosys.com, freebsd-security@FreeBSD.ORG
Subject:   Re: ssh-feature 'backdoor'
Message-ID:  <20000120075151.A3515@foobar.franken.de>
In-Reply-To: <20000120001840W.1000@eccosys.com>; from sen_ml@eccosys.com on Thu, Jan 20, 2000 at 12:18:40AM %2B0900
References:  <20000119155203.C8404@is.co.za> <20000119154348.A6412@supra.rotterdam.luna.net> <20000119165350.E8404@is.co.za> <20000120001840W.1000@eccosys.com>

next in thread | previous in thread | raw e-mail | index | archive | help
On Thu, Jan 20, 2000 at 12:18:40AM +0900, sen_ml@eccosys.com wrote:
> marcs> Ah ok -- I see what you mean.  I suppose another way you could kind of
> marcs> prevent this is to use tcp_wrappers thereby being sure that only the
> marcs> hosts you want can get into the box.
> 
> 'being sure' is a bit strong don't you think?  if someone has spoofed the
> ip address it doesn't help you at all.

You want to do a blind-spoof on a cryptographic key-exchange?
Good luck.

bye,
  Harold

-- 
Someone should do a study to find out how many human life spans have
been lost waiting for NT to reboot.
              Ken Deboy on Dec 24 1999 in comp.unix.bsd.freebsd.misc


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20000120075151.A3515>