mailing list archives
Re: sshd1 allows unencrypted sessions regardless of server policy
From: pavel () SUSE CZ (Pavel Machek)
Date: Tue, 14 Dec 1999 22:00:21 +0100
Because passphrase-less hostkeys are 'encrypted' with cipher "none"
the code for this cipher is always compiled into the programs. This
way the client is free to choose "none" and no server will complain.
And what? Malicious ssh client can make non-encrypted connection. But
malicious ssh client can also send carbon-copy of all communication to
www.cia.org:5000! There's no way to protect from malicious ssh
The current version OpenSSH-1.2.1 is not vulnerable. The obvious
...and I don't see why this is called vulnerability.
I'm pavel () ucw cz "In my country we have almost anarchy and I don't care."
Panos Katsaloulis describing me w.r.t. patents me at discuss () linmodems org
sshd1 allows unencrypted sessions regardless of server policy Markus Friedl (Dec 14)
SSH-1.2.27 & RSAREF2 exploit Iván Arce (Dec 14)
SSH 1 Why? Daniel P. Zepeda (Dec 15)
Re: SSH 1 Why? Emiliano Kargieman (Dec 15)
Re: SSH 1 Why? Emiel Kollof (Dec 15)
Re: SSH 1 Why? Iván Arce (Dec 16)
Re: SSH 1 Why? R. J. Wysocki (Dec 18)
Groupewise Web Interface Sacha Faust Bourque (Dec 19)
Re: Groupewise Web Interface Raymond Dijkxhoorn (Dec 20)