Return to BSD News archive
Path: euryale.cc.adfa.oz.au!newshost.carno.net.au!harbinger.cc.monash.edu.au!munnari.OZ.AU!spool.mu.edu!uwm.edu!news-peer.gsl.net!news.gsl.net!news.sgi.com!news.sprintlink.net!news-stk-200.sprintlink.net!news.wwa.com!chilton!chris From: chris@vindaloo.com (Christopher Sean Hilton) Newsgroups: comp.unix.bsd.freebsd.misc Subject: Re: TCP Encryption Date: Sun, 29 Sep 1996 13:46:56 GMT Organization: Vindaloo Communications Lines: 17 Message-ID: <DyHyA9.K3@vindaloo.com> References: <Pine.BSF.3.91.960928164946.15233A-100000@darkstar> NNTP-Posting-Host: pool13-021.wwa.com In article <Pine.BSF.3.91.960928164946.15233A-100000@darkstar>, Charles Mott <cmott@srv.net> wrote: >A well known and worrisome aspect of two standard TCP applications, Telnet >and FTP, is that usernames and passwords are sent in the clear, as well as >the rest of the data stream in a given session. Ethernet listening >software is increasingly available to less skilled users -- and malicious >hackers are usually among this less skillful group. > ssh does this. It's in the ports collection. Chris -- +--------------------------------------------------------------------+ | __o "All I was doing was trying to get home from work." | | _`\<,_ -Rosa Parks | +_(*)/_(*)___________________________________________________________+