On Thu, 14 Mar 2002, Rick Warner wrote:

> 
> 
> On Thu, 14 Mar 2002, David Talkington wrote:
> 
> > Leaving aside for a moment the fact that the Sun admin needs his/her
> > head checked for having telnet open in the first place (it appears
> > that the telnet buffer overflow from last summer was patched ... in
> > _January_), you should probably try 'export TERM=vt100' before
> > connecting and see if that helps.
> >
> > If, on the other hand, it is you that administers this Sun box, then
> > *thwap* to you for not killing telnet ages ago.
> 
> Nothing wrong with telnet in a firewalled environment, unless you are
> worried about your users.  OpenSSH has had a much more checkered security
> history in the past few months.  Recently: the issue last week with
> multiple channels, then the zlib issue announced yesterday.  Two upgrades
> in one week for security issues!  Now which protocol is the bigger security
> threat?  Think the answer is equivocal at this time.

 The openssh issue was fixed by a one line patch, indeed a single
character change, which because of the "open" nature of the source
could be applied by anyone with a text editor and the ability to
type.  The zlib issue was apparently very difficult to exploit.

 I think the chief danger with SSH is that using it can engender a
kind of complacency with regard to security.

 On the other hand, the chief weakness of telnet is that it's crap in
comparison with SSH for many reasons other than security.

> - rick -




_______________________________________________
Redhat-list mailing list
[EMAIL PROTECTED]
https://listman.redhat.com/mailman/listinfo/redhat-list

Reply via email to