ssh security

José Nicolás Castellano jncastellano at noconname.org
Fri Mar 18 04:17:10 PST 2005



Stian Øvrevåge wrote:

>Another problem is the Man-in-the-Middle problem, where you are led to
>believe that you are communicating with your home-computer, but your
>session is relayed on through a decrypting/encrypting gateway which is
>under someone else's controll.
>  
>
Of course exists the man-in-the middle by suplanting primarily keys, and 
other possibility is exploiting any vulnerability of server and client.
But if anyone is trying to MITM you, client alerts you that keys don't 
match to primarily ssh handshaking keys and possibly someone is MITM you.
.

-- 
Jose Nicolas Castellano
Presidente - Asociación No cON Name
Tel:     +34 616 727 675
E-Mail  : jncastellano at noconname.org
WWW: www.noconname.org



More information about the freebsd-questions mailing list