Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email firstname.lastname@example.org
Re: [suse-security] Protocol SSH1
Date: Thu Oct 21 2004 - 08:34:11 CDT
Mauro Teani wrote:
> Protocol SSH1 is safe? I mean, if many users have access to a remote server on wich works a ssh server upgraded to the last patch, and i do it by mean of a ssh1 client (teraterm for example) may i be sure that the connection is safe or i must change to SSH2 protocol?
> Which type of attack may i expect as well than buffer-overflow?
SSHv1 is vulnerable to man-in-the-middle attacks. It's not a matter of
a buffer-overflow, but someone actually being able to decrypt and read
For windows machines, I recommend PuTTY:
Linux machines, of course, should already have OpenSSH installed...
Check the headers for your unsubscription address
For additional commands, e-mail: suse-security-helpsuse.com
Security-related bug reports go to securitysuse.de, not here