At 22:28 Uhr -0700 21.7.2001, Nikolay Hristov wrote:
I've found some utilities that claims that can sniff ssh1 and https traffic (man-in-the-middle attack) - <http://ettercap.sourceforge.net>http://ettercap.sourceforge.net Is it true? And why are these certificates and SSL support for web servers? Can someone explain why it is possible or why it isn't?
I think ssh will warn the user that the host key has changed. So don't blindly tell ssh to accept the new one :-) For https attacks, you will probably need an 'officially' signed server certificate if you don't want the users' browser complain about invalid certificates. Why don't you try it? :-) (I'll do when I find time) christian. btw don't use html email

