Re: Attacks on ssh port

看板FB_security作者時間21年前 (2004/09/23 16:28), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串25/29 (看更多)
On Thu, Sep 23, 2004 at 10:09:22AM +0200, Dag-Erling Smorgrav wrote: > Nick Cleaton <nick@cleaton.net> writes: > > I want access to my system from any IP address, so I've patched my > > sshd so that a secret token is required to connect. [...] > Look up "replay attack" on google... Indeed, this doesn't keep out attackers who can sniff a valid session, just like tcp_wrappers doesn't keep out attackers who can spoof an authorized source address. Nick -- $_='YN8KuE*** http://www.exonetric.com/ Telehouse UK colo ***HARQr**' ..'NfzV0YrC1*** GBP40/month +VAT 40G BW no setup fee ***MnjJ**' ..'6QvtcPgQ20*** ***nlS**' ;s/(.)(.*(.))/$2.chr(32+(ord($1)+ord$3)%89)/euntil/Foo/;eval#****' _______________________________________________ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org"
文章代碼(AID): #11Keam00 (FB_security)
討論串 (同標題文章)
文章代碼(AID): #11Keam00 (FB_security)