Hello people,
a colleague writes:
<talking about ssh cipher algorithms>
"The initial connection always has to setup a secure channel to swap 
transport encryption keys. If you can grep these keys you know how to 
un-encrypt the data stream."
Has he got a point?
I think the refers to man-in-the-middle. I think you have to be very 
quick to sniff the key and I also though that the keys cannot be reused 
for a different session.
Am I totally wrong?
-- 
Ottavio Caruso
http://www.pledgebank.com/boycottvista