(Untitled)

May 23, 2009 08:45

SSH plaintext bits recovery paper: http://www.isg.rhul.ac.uk/~kp/SandPfinal.pdf

Leave a comment

Comments 2

grey_olli May 23 2009, 21:49:52 UTC
пасиба за линк.
Судя по:
------------
One of the main challenges for building an exploit based
on our proof-of-concept code would be to find a service
which tolerates SSH connection failures and reconnects on
these failures. One such client is for instance the Fuse
SSHFS [19] implementation which accepts a reconnect
flag and doesn’t seem to care about about the nature of the
connection termination. Even then, the attacks require large
numbers of reconnects and may consume a lot of bandwidth
------------
практически эти атаки - это сферический конь в вакууме. Или я не прав? ?-)

Reply

beezari May 24 2009, 10:10:29 UTC
nu tipa 'default' ne popret, esli ti ob etom :)

Reply


Leave a comment

Up