Re: Using unprotected Wifi
- From: Roy Smith <roy@xxxxxxxxx>
- Date: Mon, 31 May 2010 12:53:06 -0400
In article <slrni07k41.ecr.news@xxxxxxxxxxxxx>,
Jon Solberg <news@xxxxxxxxxxxxxxxxxxxx> wrote:
historically there has existed buggy implementations of SSH
susceptible of password sniffing and some of these are still around.
Although running against a reasonably modern client-servers pair (SSH
v.2) should be safe, keys are still a good thing.
To expand on Jon's statement, note that to find a pre-v.2
implementation, you need to set the controls on the way-back machine to
something like 15 years ago. You would have to put some effort into
find any examples being used in the field today.