hi,
There are many methods of achieving secure authentication already, such
as APOP, KPOP, and IMAP.
You can also do Secure POP via SSH. there is a mini HOWTO available on
the subject.
But Your mail provider may be unable or unwilling to use a more secure
protocol.
exactly!
i have two
Robins == Robins Tharakan [EMAIL PROTECTED] writes:
Robins [snip]
Robins ssh -L 56110:pop.net4india.com:110 somebody.us.net
Robins -L56025:smtp.net4india.com:25 -C
Ah! You' have managed to defer snooping of the password from your
local LAN to the LAN the US server is on. Don't
Ah! You' have managed to defer snooping of the password from your
local LAN to the LAN the US server is on. Don't forget, the password
will still be sent in clear-text from the SSH server to the POP3
server.
quite true.
but that seems a slightly more acceptable idea, rather than people on
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
On Mon, Aug 18, 2003 at 01:15:52AM +0530, Robins Tharakan wrote:
Robinshi,
Robins
Robins
Robinsi just did a tcpdump on the local cable wallah network, and realised
Robinsthat anyone with a
Robinstcpdump -i eth1 -w file.dump
Robinscan easily see my
Robins == Robins Tharakan [EMAIL PROTECTED] writes:
Robins hi, i just did a tcpdump on the local cable wallah
Robins network, and realised that anyone with a tcpdump -i eth1
Robins -w file.dump can easily see my pop username/pwd
Robins is there any way out? or is this the