Hello people,
a colleague writes:
<talking about ssh cipher algorithms>
"The initial connection always has to setup a secure channel to swap
transport encryption keys. If you can grep these keys you know how to
un-encrypt the data stream."
Has he got a point?
I think the refers to man-in-the-middle. I think you have to be very
quick to sniff the key and I also though that the keys cannot be reused
for a different session.
Am I totally wrong?
--
Ottavio Caruso
http://www.pledgebank.com/boycottvista