At 11:03 PM 7/6/2000 -0400, Kenneth E. Lussier wrote:
>Benjamin Scott wrote:
> > Hmmm. AFAIK, simply having telnet open isn't insecure. It is
> > using telnet -- specifically, logging in with your password in
> > the clear -- that makes you vulnerable to sniffed passwords. SSH
> > will help prevent that.
>
i'd like to point out that the "sploit" is available from a lot of
places...if i recall its in its source form at rootshell.org i think...if
you have half a brain and have worked with *nix enough you should be able
to compile it...
Keene State College's sites were owned that way....though the telnet
daemon....funny thing is...they still have it open....look at additron.org
for a mirror of the hacked page. I think that its still there...
>Actually, this isn't always true... Some telnet and ftp daemons
>can have remote exploits and buffer overflows. To my knowledge,
>this is rare, since people don't usually muck with the code for
>them. And, in all fairness, SSH did have an issue with the rsa
>reflib, which is the reason that I use OpenSSH from outside of
>the US.
most telnet and ftp deamons have buffer overflows......off the top of my
head wuFTP was a bad one....i think that they have a lot of that cleaned up
now...but i still wouldn't use wuFTP if you paid me :-)
> > However, simple SSH session encryption won't protect against
> > man-in-the-middle attacks, and it is still vulnerable to brute
> > force attacks and weak passwords.
when we have a user who wants a shell...we have password criteria that his
password has to meet....and they are required to change their password
every 6 months.......that's going to get a lot tougher when we install
OpenBSD too :-)
>That's easy to fix... don't use passwords ;-)
>
> > Only SSH with mutual public/private key authentication is truly
> > secure against all known attacks.
>
>This I have to agree with. Public key authentication is really
>the best way to go for any system. Not to mention that it's a lot
>easier than remembering a ton of passwords.
>
>
>Kenny
>
>
>**********************************************************
>To unsubscribe from this list, send mail to
>[EMAIL PROTECTED] with the following text in the
>*body* (*not* the subject line) of the letter:
>unsubscribe gnhlug
>**********************************************************
Kurth Bemis - Senior Linux Network/Systems Administrator, USAExpress.net
[EMAIL PROTECTED]
http://www.usaexpress.net/kurth
ICQ - 6624050
Call Sign - N1TYW
PGP key available - http://www.usaexpress.net/kurth/pgp
Fight Weak Encryption! Donate your wasted CPU cycles to Distributed.net
(http://www.distributed.net)
**********************************************************
To unsubscribe from this list, send mail to
[EMAIL PROTECTED] with the following text in the
*body* (*not* the subject line) of the letter:
unsubscribe gnhlug
**********************************************************