[ On Thursday, August 10, 2000 at 22:13:46 (-0400), Justin Wells wrote: ]
> Subject: Re: cvs-nserver and latest CVS advisory
>
> Yes that's true, given an attack there is a 1 in 10 chance someone will 
> be posing as someone else. In that case I disable the userid and wait to
> see what explanation I get from the userid in question (since I wouldn't
> yet know if they're the attacker or the victim).
> 
> So what's wrong with that? 

What's wrong with that is that you still have almost zero
accountability.  Under cvspserver anyone can be anyone with only a very
few tricks up their sleeves.  That simply cannot possibly ever happen
with SSH.

> > But the real culprit gets away.  This wouldn't happen with SSH.
> 
> The culprit gets away no matter what. There's nothing I can do to
> them even if I find out which email address is really associated
> with the attack.

No, with SSH the culprit cannot "get away".  You've got a finger
pointing right at them, and a mound of evidence to show what they did,
when, and how.  I.e. you have a counter-threat, and possibly one that's
far more powerful than the threat they posed to you earlier.

-- 
                                                        Greg A. Woods

+1 416 218-0098      VE3TCP      <[EMAIL PROTECTED]>      <robohack!woods>
Planix, Inc. <[EMAIL PROTECTED]>; Secrets of the Weird <[EMAIL PROTECTED]>

Reply via email to