On Thu, Aug 23, 2001 at 03:08:51PM +0200, Samu wrote:
> On Thu, Aug 23, 2001 at 06:13:04PM +1000, Sam Couter wrote:
> > Philipp Schulte <[EMAIL PROTECTED]> wrote:
> > >
> > > You should never be too lazy to log in as a user and su to root.
> >
> > su to root: 8 character password.
> > ssh directly as root: 1024 bit RSA key.
> >
> > Which one is easiest to crack?
> >
> ssh
> try sshmitm in dsniff package ... :-))
> key exchanging is not make it in a secure manner
It is secure when you have put the public key on the remote machine
already. SSH is only vulnerable to man-in-the-middle when you first
connect to a host, and accept the host-key.
--
#define X(x,y) x##y
Peter Cordes ; e-mail: X([EMAIL PROTECTED] , ns.ca)
"The gods confound the man who first found out how to distinguish the hours!
Confound him, too, who in this place set up a sundial, to cut and hack
my day so wretchedly into small pieces!" -- Plautus, 200 BCE
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]