Interview with OpenSSH developer: http://www.securityfocus.com/columnists/375
Summary: Arbitrary layer 2/3 tunnelling using tun(4) interfaces over ssh. Various changes to reduce attack possibilities. My first encounter with the term "attack surface". Commentary: TCP over TCP --- retransmit timeout synchrony. Creeping featurism? Ubiquitous network tunnelling is just a revision away. This is inevitable. Aside: I'm currently imagining some kind of network shell that deals with tunnels between nodes like /bin/sh deals with pipes between programs. -- http://www.lightconsulting.com/~travis/ "Vast emptiness, nothing sacred." -- Bodhidharma -><- GPG fingerprint: 50A1 15C5 A9DE 23B9 ED98 C93E 38E9 204A 94C2 641B --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]