ssh security
José Nicolás Castellano
jncastellano at noconname.org
Fri Mar 18 04:17:10 PST 2005
Stian Øvrevåge wrote:
>Another problem is the Man-in-the-Middle problem, where you are led to
>believe that you are communicating with your home-computer, but your
>session is relayed on through a decrypting/encrypting gateway which is
>under someone else's controll.
>
>
Of course exists the man-in-the middle by suplanting primarily keys, and
other possibility is exploiting any vulnerability of server and client.
But if anyone is trying to MITM you, client alerts you that keys don't
match to primarily ssh handshaking keys and possibly someone is MITM you.
.
--
Jose Nicolas Castellano
Presidente - Asociación No cON Name
Tel: +34 616 727 675
E-Mail : jncastellano at noconname.org
WWW: www.noconname.org
More information about the freebsd-questions
mailing list