Re: Using unprotected Wifi



In article <slrni07k41.ecr.news@xxxxxxxxxxxxx>,
Jon Solberg <news@xxxxxxxxxxxxxxxxxxxx> wrote:

historically there has existed buggy implementations of SSH
susceptible of password sniffing and some of these are still around.
Although running against a reasonably modern client-servers pair (SSH
v.2) should be safe, keys are still a good thing.

To expand on Jon's statement, note that to find a pre-v.2
implementation, you need to set the controls on the way-back machine to
something like 15 years ago. You would have to put some effort into
find any examples being used in the field today.
.



Relevant Pages

  • Re: Using unprotected Wifi
    ... running against a reasonably modern client-servers pair (SSH v.2) ... should be safe, keys are still a good thing. ...
    (comp.os.linux.networking)
  • Re: Using unprotected Wifi
    ... of password sniffing and some of these are still around. ... keys are still a good thing. ... But that was a case of weak ssh keys, ... Just brute force password cracking, ...
    (comp.os.linux.networking)
  • Re: Using unprotected Wifi
    ... susceptible of password sniffing and some of these are still ... pair (SSH v.2) should be safe, keys are still a good thing. ... Just brute force password cracking, ...
    (comp.os.linux.networking)
  • Re: Using unprotected Wifi
    ... of password sniffing and some of these are still around. ... keys are still a good thing. ... But that was a case of weak ssh keys, ... Just brute force password cracking, ...
    (comp.os.linux.networking)
  • Re: Using unprotected Wifi
    ... susceptible of password sniffing and some of these are still ... pair (SSH v.2) should be safe, keys are still a good thing. ... Just brute force password cracking, ... The protocol, like many, was weak ...
    (comp.os.linux.networking)