3 Apr
2006
3 Apr
'06
09:12
On Thu, Mar 30, 2006 at 10:28:02AM +0200, Moskito wrote:
Hello List,
Hello.
I just wondered how a dns-spoofing attack to ssh could work in general?
It's useful when using Rhosts authentication which do not use any crypto
but mimics the Berkley r-commands.
Note: Do NOT use Rhosts authentication. ;)
--
Bye,
Thomas
--
Thomas Biege