hi Greg,
> >       Actually any version of ssh 1.2 or less as well as openssh 1.21 or less..
> 
> Indeed, but the really important thing to remember is that doing
> *anything* with a compromised server, let alone SSH'ing into it, is very
> risky business indeed.

Agreed you leave yourself wide open to all sorts of fun and games;-))

> If you have some automated job running "scp" or "ssh" and you don't have
> good strong intrusion detection facilities to protect the server (which
> would make it at least possible to stop the automated job before it
> allowed any propogation of the attack) then you're taking massive risks
> already.
Yes anytime you automate you are assuming that whatever you are 
automating is shall we say not currently being exploited..
\> 
> Any SSH server trusting a compromised client is in even worse shape, and
> if you agree with Bruce Schneier (or me! ;-) then you'll know there is
> no such thing as "trusted client software"!  :-)
Hmmm.. i would agree with that as well.. actually any time you do anything 
there is a degree of risk.. :-))
> -- 
>                                                       Greg A. Woods

Reply via email to