15 Apr
2009
15 Apr
'09
12:04
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 On Wednesday, 2009-04-15 at 13:38 +0200, Dominique Leuenberger wrote: ...
A typical approach on 'brute force' is to reduce the used space. I think I have actually never seen a real brute force against my ssh server. It's typically based on dictionary attacks.
You can not use a dictionary attack to break ssh keys, just passwords. - -- Cheers, Carlos E. R. -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.9 (GNU/Linux) iEYEARECAAYFAknlzWsACgkQtTMYHG2NR9UxbQCdFdb5OGi/wbyuvj1VFbBOF4Qc ZZUAnjk1QkSJDUoN0nXQkUrSN4ZdELub =Fyh8 -----END PGP SIGNATURE----- -- To unsubscribe, e-mail: opensuse+unsubscribe@opensuse.org For additional commands, e-mail: opensuse+help@opensuse.org