nanog mailing list archives

Re: telnet vs ssh on Core equipment , looking for reasons why ?


From: <alex () yuriev com>
Date: Tue, 31 Jul 2001 10:41:59 -0400 (EDT)


so thats my main logic, authentication... i cant understand the big
paranoia on people sniffing tho!

unfortunately ssh is just as sniffable if it's an arp spoof, but hopefully
it's not as easy for the naughty eavesdropper to get into the right
position for that....

Pardon for blowing your bubble but sniffing ssh keyexchange does not do you
any good. The symmetric key is exchanged via a channel aready secured. The
keys that is used to secure the channel used to exchange the symmetric key
are exchanged via DH-based protocol. If you want to spend your time
factoring primes for next 500 years to extract the key, you are more than
welcome to try. It is crypto-101.

Alex


Current thread: