On Wed, Sep 26, 2001 at 09:07:46AM +0800, Rino Mardo wrote:
> if i recall correctly, the issue is mtm or monkey-in-the-middle attack which
> apparently is still present with protocol 2.
This is an issue with the Diffie-Hellman protocol which SSH uses to
exchange keys. The only way to avoid it is to have guaranteed
authentic host keys for all machines you connect to (i.e. turn on
StrictHostKeyChecking and use a sneaker net to transfer the host keys
to all the machines that need to connect) in your ~/.ssh/known_hosts
file. Any MITM attacks will be instantly detected because the host
key used by the monkey cannot be authentic (if it were, you're screwed
anyway provided the SSH installation was properly done.
I think it would also be much better to abandon password-based logins
for good and use public key authentication instead...
--
Rafael R. Sevilla <[EMAIL PROTECTED]> +63(2) 8177746 ext. 8311
Programmer, InterdotNet Philippines +63(917) 4458925
http://dido.engr.internet.org.ph/ OpenPGP Key ID: 0x5CDA17D8
_
Philippine Linux Users Group. Web site and archives at http://plug.linux.org.ph
To leave: send "unsubscribe" in the body to [EMAIL PROTECTED]
To subscribe to the Linux Newbies' List: send "subscribe" in the body to
[EMAIL PROTECTED]