Re: references to password sniffer incident

1999-04-11 Thread Bill Frantz
I know of three systems that have been attacked in the last month or so. One was attacked by social engineering the password out of an user. Another was attacked by installing NETBUS on an user's machine. The third was attacked by having the attacker subscribe himself to the mailing list used to

Re: references to password sniffer incident

1999-04-09 Thread Daniel J. Frasnelli
At the 2600-coordinated Beyond HOPE conference (NYC, 1997), it was made very clear to users that passwords transmitted in-the-clear would be Right, passwords always have been the weakest link. panel singled-out an unlucky telnet user, announcing a domain name and Not just telnet is

Re: references to password sniffer incident

1999-04-08 Thread Dominick LaTrappe
While on the topic of password-sniffing anecdotes from conferences -- At the 2600-coordinated Beyond HOPE conference (NYC, 1997), it was made very clear to users that passwords transmitted in-the-clear would be sniffed. To hammer home the point, one participant in the Tiger Teaming panel

RE: references to password sniffer incident

1999-03-26 Thread Brown, R Ken
Phil Karn wrote (amongst other things) The people who run today's MIS/IT departments are the direct descendents of those who ran big computer centers in the old days. No we're not their descendents - we are the same guys. Those "old days" aren't that long ago we haven't been put out to

Re: references to password sniffer incident

1999-03-25 Thread Jurgen Botz
I'm going to go off on a bit of a tangent here... this is really a security issue, not a crypto issue, but I think it's something that we'd all do well to think about. Derek Atkins wrote: sniffible, none of my passwords were. I happen to be one of the lucky few who has made it through the

Re: references to password sniffer incident

1999-03-25 Thread Steve Schear
At 08:35 AM 3/25/99 -0800, Jurgen Botz wrote: Yes, I could demand that all my remote users be running NT4.0SP4 with some additional security patches and have all their services turned off (or better still, Linux or *BSD configured by my network engineers), but how am I going to enforce this?

Re: references to password sniffer incident

1999-03-24 Thread Tom Perrine
On Tue, 23 Mar 1999 14:54:15 -0800 (PST), Phil Karn [EMAIL PROTECTED] said: Phil Actually, things are getting much better in the IETF terminal rooms. Phil SSH is now *very* widely used, with encrypted Telnet and IPSEC Phil trailing well behind. Phil Phil The same for every

Re: references to password sniffer incident

1999-03-24 Thread Phil Karn
...And of course nobody has compromised any of the ssh binaries on the workstations... Workstations? What workstations? Anybody serious about security brings their own laptops. And then they worry about them being tampered with by the hotel custodial staff. Laptops are also easier to lug into a

Re: references to password sniffer incident

1999-03-24 Thread Richard Guy Briggs
-BEGIN PGP SIGNED MESSAGE- Actually, things are getting much better in the IETF terminal rooms. SSH is now *very* widely used, with encrypted Telnet and IPSEC trailing well behind. ...And of course nobody has compromised any of the ssh binaries on the workstations... Phil

RE: references to password sniffer incident

1999-03-24 Thread salzr
as one person who downloaded the source from his home site, and then compiled it on the local machine with a GCC binary which he had also brought from "home". So he trusted the libaries and headers on the local machine? That seems less secure than bringing statically-linked binaries on a floppy,

Re: references to password sniffer incident

1999-03-23 Thread William Allen Simpson
Catching up on email, I will point out that every major service provider is probably compromised to one degree or another as frequently as 3 times per year from terminal rooms. For example, in addition to Usenix meetings: IETF meetings, NANOG meetings, and every other computer meeting or show

Re: references to password sniffer incident

1999-03-23 Thread Phil Karn
Actually, things are getting much better in the IETF terminal rooms. SSH is now *very* widely used, with encrypted Telnet and IPSEC trailing well behind. Phil

Re: references to password sniffer incident

1999-03-09 Thread Greg Rose
Thanks for the good pointers that a number of people gave. The particular incident I remembered was the BARRnet one http://www.geek-girl.com/bugtraq/1993_4/0032.html (thanks Dan Riley). I had no idea there had been so many, so well hushed up! MILNET, JANET (4 independent incidents in the UK

references to password sniffer incident

1999-03-08 Thread Greg Rose
This is a little off topic, I know, but I'm writing a paper about the work we've done on an encrypting sendmail (I'll announce details as soon as it restabilises, but if anyone wants to see the old version it's at http://www.home.aone.net.au/qualcomm ). For part of this, I wanted to refer to

Re: references to password sniffer incident

1999-03-08 Thread Daniel S. Riley
Greg Rose [EMAIL PROTECTED] writes: I wanted to refer to the incident where someone mounted a password sniffer at a major network hub (MAE-West?) a couple of years ago. But I haven't turned up anything useful in a Web search. I didn't dream this incident, did I? Does anyone have any

Re: references to password sniffer incident

1999-03-08 Thread Phil Karn
I don't specfically know about MAE-West, but there are any number of attacks on ISPs that involved setting up password sniffers on major transit Ethernets. Phil