On Tue, 19 Feb 2002, Paul Robertson wrote:
:> agreed, rsync over ssh is a good and a fairly common way to push data from
:> inner to more outer security perimeters.  in addition to the ssh server
:> configuration, careful use and configuration of the authentication agent
:> may make it reasonable to do this unattended.
:
:[Sorry, missed the original post, but figured this was worth throwing in:]
:
:If you're using SSH, you should make every attempt to restrict the daemon
:to accepting version 2 of the protocol *only*.

why?

:The v1 fallback stuff will

what v1 fallback stuff?

:allow an attacker to use the horribly broken 1.5 stuff.

what is horribly broken?

there is a lot of FUD going around about SSH protocol 1. see
http://www.openssh.com/security.html for security information on SSH and
OpenSSH.

_______________________________________________
Firewalls mailing list
[EMAIL PROTECTED]
http://lists.gnac.net/mailman/listinfo/firewalls

Reply via email to