Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 20 Jan 2000 16:03:25 +0900
From:      sen_ml@eccosys.com
To:        freebsd-security@FreeBSD.ORG
Subject:   Re: ssh-feature 'backdoor'
Message-ID:  <20000120160325Z.1000@eccosys.com>
In-Reply-To: <20000120075151.A3515@foobar.franken.de>
References:  <20000119165350.E8404@is.co.za> <20000120001840W.1000@eccosys.com> <20000120075151.A3515@foobar.franken.de>

next in thread | previous in thread | raw e-mail | index | archive | help

> 'being sure' is a bit strong don't you think?  if someone has spoofed the
> ip address it doesn't help you at all.

logix> You want to do a blind-spoof on a cryptographic key-exchange?

not necessarily.  if you perform a successful denial-of-service attack
of a certain type on one of your allowed hosts, and you know a
password to get in to the server running the ssh daemon, then you can
manage i think.


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20000120160325Z.1000>