-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
i had another questionable MITM attack today. fortunately, i was connecting to
my own server and was able to check the SSH logs. the connection came from
82.103.134.252/tor-proxy.thing2thing.com.
the interesting thing is: after waiting 2-3
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Mike Perry @ 2006/10/16 13:25:
Thus spake Taka Khumbartha ([EMAIL PROTECTED]):
today i have had several attempted man in the middle attacks on my
SSH sessions. i am not sure which exit node(s) i was using, but the
MD5 hash of the fingerprint of
Thus spake Taka Khumbartha ([EMAIL PROTECTED]):
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1
Mike Perry @ 2006/10/16 13:25:
Thus spake Taka Khumbartha ([EMAIL PROTECTED]):
today i have had several attempted man in the middle attacks on
my SSH sessions. i am not sure which exit
There have been various TOR exit nodes that have been behaving badly
lately (check the tor-talk list) .. some are doing frames, popups, etc
.. there is a list of bad nodenames somewhere on that list (can't find
it at hand..)
Personally, I wouldn't use any exit node in China .. use the
Thus spake Taka Khumbartha ([EMAIL PROTECTED]):
today i have had several attempted man in the middle attacks on my
SSH sessions. i am not sure which exit node(s) i was using, but the
MD5 hash of the fingerprint of the spoofed host key is:
4d:64:6f:bc:bf:4a:fa:bd:ce:00:b0:8e:c9:40:60:57
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
hmm sorry, but i did not sign the message!
Taka Khumbartha @ 2006/10/15 22:09:
today i have had several attempted man in the middle attacks on my SSH
sessions. i am not sure which exit node(s) i was using, but the MD5 hash of
the fingerprint of
6 matches
Mail list logo