[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
RE: [cobalt-security] re: Telnet security
- Subject: RE: [cobalt-security] re: Telnet security
 
- From: "Drage, Nicholas" <nickd@xxxxxxxxx>
 
- Date: Wed, 25 Apr 2001 18:13:37 +0100
 
- List-id: Mailing list for users to address network security on Cobalt products. <cobalt-security.list.cobalt.com>
 
> -----Original Message-----
> From: Adam Sculthorpe [mailto:sculthorpe@xxxxxxxxxxxxx]
> Sent: 25 April 2001 15:16
> SSH1 logins can also be sniffed and cracked in a switched 
> environment,
Can you expand on this a bit further if you have the time?
> use SSH2 on a non-standard listening port
Why a non-standard port, that won't make a great deal of difference will it?
Anyone capable of successfully cracking a switched environment should be
capable of dealing with a change in port numbers IMHO.
( kept on the list due to SSH being important for Cobalt admin.... and a lot
of people being in switched environments in co-lo facilities I bet )
-- 
Nick Drage - Security Architecture - Demon Internet - Thus PLC
As of Wed 25/04/2001 at 16:00 
This computer has been up for 0 days, 22 hours, 28 minutes, 34 seconds.