пасиба за линк. Судя по: ------------ One of the main challenges for building an exploit based on our proof-of-concept code would be to find a service which tolerates SSH connection failures and reconnects on these failures. One such client is for instance the Fuse SSHFS [19] implementation which accepts a reconnect flag and doesn’t seem to care about about the nature of the connection termination. Even then, the attacks require large numbers of reconnects and may consume a lot of bandwidth ------------ практически эти атаки - это сферический конь в вакууме. Или я не прав? ?-)
Comments 2
Судя по:
------------
One of the main challenges for building an exploit based
on our proof-of-concept code would be to find a service
which tolerates SSH connection failures and reconnects on
these failures. One such client is for instance the Fuse
SSHFS [19] implementation which accepts a reconnect
flag and doesn’t seem to care about about the nature of the
connection termination. Even then, the attacks require large
numbers of reconnects and may consume a lot of bandwidth
------------
практически эти атаки - это сферический конь в вакууме. Или я не прав? ?-)
Reply
Reply
Leave a comment