On Tue, 19 Feb 2002, Paul Robertson wrote: :> agreed, rsync over ssh is a good and a fairly common way to push data from :> inner to more outer security perimeters. in addition to the ssh server :> configuration, careful use and configuration of the authentication agent :> may make it reasonable to do this unattended. : :[Sorry, missed the original post, but figured this was worth throwing in:] : :If you're using SSH, you should make every attempt to restrict the daemon :to accepting version 2 of the protocol *only*.
why? :The v1 fallback stuff will what v1 fallback stuff? :allow an attacker to use the horribly broken 1.5 stuff. what is horribly broken? there is a lot of FUD going around about SSH protocol 1. see http://www.openssh.com/security.html for security information on SSH and OpenSSH. _______________________________________________ Firewalls mailing list [EMAIL PROTECTED] http://lists.gnac.net/mailman/listinfo/firewalls
