xsprite@bigfoot.com writes:
ssh: mitm, key stroke analysis (which seems to have been "discovered" lately but i thought it was obvious to anyone sitting down with tcpdump and an ethernet with ssh...)
Can someone clue me in on how MITM attack would work here? Am I right in thinking it's only when the user types their password into the remote machine?
The problem with certificate based approaches is that in order to be
What alternatives are there to certificates?
I'm probably just hard-of-thinking this morning.