telnet vs ssh on Core equipment , looking for reasons why ?

fingers fingers at
Tue Jul 31 15:39:12 UTC 2001


> Monkey in the Middle attack on SSH is very difficult to perform. I'm cc'ing
> Matt Bishop (bishop at who together with yours truly wrote a
> paper on this in 1997.

Well I saw a monkey do it in 10 minutes with ettercap. Sorry I did mention
in 1 of my posts that the ssh key sniff was done using arp soofing, my
text got lost somewhere along the line....


More information about the NANOG mailing list