On Thu, 17 Jan 2008, Vic wrote:

> The sniffer programem to use is now called Wireshark. It used to be called
> Ethereal - they changed the name.

Found/installed Wireshark last night on my system at home.


> But the problem you've got is getting the packets to sniff; most LANs
> these days are switched, so you're not supposed to see traffic not
> intended for you. But we can beat that.

Between the kids and I we have a 3-computer Linux LAN for gaming,
with a 10Mbit HUB (not a switch) connecting their two computers to
mine.  I installed the tweaked SSHD on one of their computers, then
ran the client and Wireshark on mine.

Worked well.  I've proven that without the client flags I get
encryption, with them I don't (after authentication that is).  I'd
love to have independent verification though.


> For cleartext communication? Not me, thanks. I like my SSH encrypted...

Me too, except not for ham radio as it's illegal around here.
That's why the interest in the tweaks to OpenSSH.

OpenSSH Client:

  /usr/local/bin/ssh -o NoneSwitch=yes -o NoneEnabled=yes 192.168.2.2


OpenSSH Server:  /etc/ssh/sshd_config or /usr/local/etc/sshd_config
depending on where SSHD was installed:

  "NoneEnabled yes"

--
Curt, WE7U: <www.eskimo.com/~archer/>     XASTIR: <www.xastir.org>
  "Lotto:  A tax on people who are bad at math." -- unknown
"Windows:  Microsoft's tax on computer illiterates." -- WE7U
The world DOES revolve around me:  I picked the coordinate system!
-
To unsubscribe from this list: send the line "unsubscribe linux-hams" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to