On Sat, Sep 22, 2001 at 12:45:35AM +1000, Darren Reed wrote:
> Are there any inherent protocol weaknesses or flaws which arise when a
> password is used to login over ssh vs the public/private key method ?

yes.

ssh protocol version 2 public key authentication allows
detection of man in the middle attacks, for example.

---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to