Bill,
The short answer is yes (it's not secure). TN3270 is just a (somewhat odd)
terminal on plain old TELNET. If you do look at the traffic, remember it's
in EBCDIC (not ASCII).
The long answer is that there's an encryption (TLS/SSL) draft RFC for
TN3270, and it's been implemented in at least a couple of places. Current
versions of Communications Server for OS/390, for example. Whether or not
Hummingbird supports it, and has been configured to use it, is another
question.
-Robert
At 01:17 PM 9/4/01 -0400, Bill McCabe wrote:
>
>Hi All
>
>Before I delve into the RFCs describing the 3270E data stream protocol, can
>anyone tell me if (like telnet) the login sequence for example between say
>a Hummingbird Exceed 3270e client and the OS/390 host is sniffable? That
>is, if I can decode the 3270 data stream, can I retrieve the uid/password
>pair? I'm assuming the answer is yes, but need to know for sure.
>
>Thanks in advance,
>
>Bill
>
>
>
>
>===========================================================================
=====
> To unsubscribe from this mailing list, please see the instructions at
> http://www.checkpoint.com/services/mailing.html
>===========================================================================
=====
>
>
================================================================================
To unsubscribe from this mailing list, please see the instructions at
http://www.checkpoint.com/services/mailing.html
================================================================================