But if Eve is later challenged to prove her identity (that she must now
maintain the illusion of being Alice), what prevents Eve from passing
the challenge on to the real Alice, getting valid results, and then
passing them back to Bob?
On Thu, 2006-08-31 at 10:01 +0400, Eygene Ryabinkin wrote:
> B
"Only if Eve gets in the way of the very first connection attempt, can
he pass her own public key off as Alice's, without Bob detecting it."
This is exactly my concern. Isn't that scary?
On Wed, 2006-08-30 at 12:52 -0600, Mark Senior wrote:
> On 8/29/06, Chris
All,
Please pardon my naivete.
I was looking at the diagram on the URL listed below and contemplating
how host fingerprinting prevents MITM attacks.
http://www.vandyke.com/solutions/ssh_overview/ssh_overview_threats.html
So my question is this... Given the illustration in the URL above, what
pr
gt;
> cd /dev
> ./MAKEDEV tty
>
> (MAKEDEV is the standard script which populates /dev with device
> entries)
>
>
> Also, is devfsd running perchance?
>
> Mike-
>
>
>
>
> Christ, Bryan wrote:
>
> >Yes. I am completely at a
, 2006-04-19 at 08:11 -0400, Greg Wooledge wrote:
> On Tue, Apr 18, 2006 at 09:58:24AM -0500, Christ, Bryan wrote:
> > Most of the suggestions I have read say to chmod 666 /dev/tty, but
> > my /dev/tty is a directory.
>
> That's bad. That's very, very bad. I'd
--- 1 root root 3, 6 2007-03-21 00:58 s6
crw--- 1 root root 3, 7 2007-03-21 00:58 s7
crw--- 1 root root 3, 8 2007-03-21 00:58 s8
crw--- 1 root root 3, 9 2007-03-21 00:58 s9
On Wed, 2006-04-19 at 08:11 -0400, Greg Wooledge wrote:
> On Tue, Apr 18, 2006 at 09:58:24AM -0500, Chr
Can anyone help? I've started getting this message on my slackware box
when trying to ssh out of it. I can ssh in, but not out. After google
searching and scanning through the mailing lists, I found some
discussions which seem to pertain to udev. The fact that I updated my
kernel sometime ago m