Re: Hardware potential to duplicate existing host keys... RSA DS

看板FB_security作者時間13年前 (2012/06/27 02:01), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串26/26 (看更多)
On Mon, 25 Jun 2012 22:47:27 -0500, J. Hellenthal <jhellenthal@dataix.net> wrote: > > Still have yet to hear of something like this happening but its real > enough considering some of the exploits out there. > Cisco Ironport devices do MITM for SSL and SSH. Clearly someone wrote enough of the code that this is feasible. It doesn't steal your passwords though, just sniffs your unencrypted session traffic to "protect company IP from being leaked". And yes, you'll get an error that the host key has changed but it wouldn't be hard to put in the destination key if you had it. _______________________________________________ freebsd-security@freebsd.org mailing list http://lists.freebsd.org/mailman/listinfo/freebsd-security To unsubscribe, send any mail to "freebsd-security-unsubscribe@freebsd.org"
文章代碼(AID): #1FwVZVDZ (FB_security)
討論串 (同標題文章)
完整討論串 (本文為第 26 之 26 篇):
文章代碼(AID): #1FwVZVDZ (FB_security)