On Thu, Jun 29, 2000 at 09:14:21PM +0300, Sami J. Lehtinen wrote:
> In general, we recommend to use ssh2; in ssh1 there are security
> weaknesses inherent in the protocol. (some of these have already been
> discussed in public forums. One example of these is the MAC-weakness.)

what are the weaknesses that have not been discussed from public forums?

Reply via email to