*BSD News Article 79706


Return to BSD News archive

Path: euryale.cc.adfa.oz.au!newshost.carno.net.au!harbinger.cc.monash.edu.au!munnari.OZ.AU!spool.mu.edu!uwm.edu!news-peer.gsl.net!news.gsl.net!news.sgi.com!news.sprintlink.net!news-stk-200.sprintlink.net!news.wwa.com!chilton!chris
From: chris@vindaloo.com (Christopher Sean Hilton)
Newsgroups: comp.unix.bsd.freebsd.misc
Subject: Re: TCP Encryption
Date: Sun, 29 Sep 1996 13:46:56 GMT
Organization: Vindaloo Communications
Lines: 17
Message-ID: <DyHyA9.K3@vindaloo.com>
References: <Pine.BSF.3.91.960928164946.15233A-100000@darkstar>
NNTP-Posting-Host: pool13-021.wwa.com

In article <Pine.BSF.3.91.960928164946.15233A-100000@darkstar>,
Charles Mott  <cmott@srv.net> wrote:
>A well known and worrisome aspect of two standard TCP applications, Telnet
>and FTP, is that usernames and passwords are sent in the clear, as well as
>the rest of the data stream in a given session.  Ethernet listening
>software is increasingly available to less skilled users -- and malicious
>hackers are usually among this less skillful group. 
>

ssh does this. It's in the ports collection.

Chris
-- 
+--------------------------------------------------------------------+
|    __o         "All I was doing was trying to get home from work." |
|  _`\<,_         -Rosa Parks                                        |
+_(*)/_(*)___________________________________________________________+