On Mon, 08 Dec 2003 03:18:53 +
Matthew Garrett [EMAIL PROTECTED] wrote:
Steve Langasek wrote:
But an ssh key on removable media is not vulnerable to keysniffing
alone, where a password is.
If such behaviour becomes common, the keysniffers will simply copy
anything that looks like an SSH
On Mon, 2003-12-08 at 03:18, Matthew Garrett wrote:
Steve Langasek wrote:
But an ssh key on removable media is not vulnerable to keysniffing
alone, where a password is.
If such behaviour becomes common, the keysniffers will simply copy
anything that looks like an SSH key that exists on
On Mon, 2003-12-08 at 15:37, David B Harris wrote:
I've also yet to see anybody post their IP address, userid, and
password for their publicly-accessible servers to a public mailing list
:)
I have. root, even.
http://lists.debian.org/debian-devel/2002/debian-devel-200206/msg01187.html
--
On Mon, 08 Dec 2003 18:38:25 -0500
Joe Drew [EMAIL PROTECTED] wrote:
On Mon, 2003-12-08 at 15:37, David B Harris wrote:
I've also yet to see anybody post their IP address, userid, and
password for their publicly-accessible servers to a public mailing list
:)
I have. root, even.
On Mon, 8 Dec 2003, Matthew Garrett wrote:
Steve Langasek wrote:
But an ssh key on removable media is not vulnerable to keysniffing
alone, where a password is.
There's no inherent increase in security from using a key on a
USB device other than the fact that attackers aren't thinking about
On Tue, 9 Dec 2003 11:04, David B Harris [EMAIL PROTECTED] wrote:
Or are you saying that you used [EMAIL PROTECTED] for your
computing needs, including storing your unencrypted GPG, unencrypted SSH
key (or encrypted, in which case both of which use the passwords you've
posted), your email
On Sun, Dec 07, 2003 at 09:27:53PM +0100, Tollef Fog Heen wrote:
father's windows 2000 laptop when it's only connected to a NAT-ed
internet connection.
How do you know it is not trojaned when u use it?
Greetings
Bernd
--
(OO) -- [EMAIL PROTECTED] --
( .. ) [EMAIL
* Matt Zimmerman
| (Please follow up on a public list)
done, -devel has M-F-T set to.
| On Sun, Dec 07, 2003 at 06:26:48PM +0100, Tollef Fog Heen wrote:
|
| * Matt Zimmerman
|
| | You would type a Debian password into a system that you do not trust
| | with an ssh private key?
|
|
* Bernd Eckenfels
| On Sun, Dec 07, 2003 at 09:27:53PM +0100, Tollef Fog Heen wrote:
| father's windows 2000 laptop when it's only connected to a NAT-ed
| internet connection.
|
| How do you know it is not trojaned when u use it?
I don't. Just like I don't know that my Debian laptop isn't
On Sun, Dec 07, 2003 at 09:27:53PM +0100, Tollef Fog Heen wrote:
* Matt Zimmerman
| (Please follow up on a public list)
done, -devel has M-F-T set to.
| On Sun, Dec 07, 2003 at 06:26:48PM +0100, Tollef Fog Heen wrote:
|
| * Matt Zimmerman
|
| | You would type a Debian password
Steve Langasek wrote:
But an ssh key on removable media is not vulnerable to keysniffing
alone, where a password is.
If such behaviour becomes common, the keysniffers will simply copy
anything that looks like an SSH key that exists on an item of removable
media. There's no inherent increase in
11 matches
Mail list logo