Du weisst, dass Blogs doch irgendwie zu Dir durchdringen, wenn Du beim Blick auf dein Mobiltelefon glaubst Dein Provider hieße "Vodkamelone".
-- Nilsk Ketelsen im IRC SucheAktuelle EinträgeBetter UX on the Nagios web interface using the corewindow parameter
Sonntag, Februar 25 2024 Avocent PM webinterface issues Samstag, September 7 2019 The missing man page: cyc_ipmicmd - Avocent IPMI power control Donnerstag, April 30 2015 Better debugging of dracut and systemd inside the initramfs Freitag, Januar 24 2014 dss_cli, an Open-E Data Storage Server command line interpreter Donnerstag, Mai 16 2013 Link ListLetzte Google Suchegoogle
nu vot ??????? ????????? ??? 74 blog.vodkamelone.de shrek rapidshare.com shrek rapidshare.com siemens s65 telefoncode entsperren how to open pendrive in virtual box fedora Für immer Shrek rapidshare.com harddisk image linux kpartx siemens handy telefoncode entsperren siemens handy zu 65 entsperren kostenlos lounge 7526 snom mib how to install openwrt on arc os lounge elmeg ICT VoIP-VPN Gateway passwort telefon-code siemens ethtool eeprom asus 330 hotspot rittal how mount centos img file kpartx virtualbox user group fedora mikrotik routerboard 433 software how to access asus 330n3g when it is in ap mode zontag mag boot usb HP Display Beleuchtung how does a lounge look like dd-wrt mmc formatieren RB 433 openwrt update intel nic firmware memory stick dhcpd3 rb-433 openwrt vlan e1000 telefoncode entsperren siemens kpartx loop test https://hotspot.t-mobile.net/wlan/welcome.do "download firmware openwrt e1000" KategorienLast played...Song: Numbers (DJ-Kicks) (Extended Vocal Mix) Artist: Booka Shade 7. Februar 2015, 02:32 Song: Numbers (DJ-Kicks) (Club Mix) Artist: Booka Shade 7. Februar 2015, 02:24 Song: Estoril Artist: Booka Shade 7. Februar 2015, 02:17 Song: Numbers (DJ-Kicks) (Extended Vocal Mix) Artist: Booka Shade 7. Februar 2015, 02:12 Song: Numbers (DJ-Kicks) (Extended Vocal Mix) Artist: Booka Shade 12. Januar 2015, 00:43 18. August 2015, 15:15
|
Sonntag, 11. März 2007SSH Null Cipher? Yes, please!Trackbacks
Trackback für spezifische URI dieses Eintrags
Keine Trackbacks
Kommentare
Ansicht der Kommentare:
(Linear | Verschachtelt)
Personally, I would never trust a tunnel to a "secure network", because I don't belive in such beasts. Proper usage of end-to-end security systems like SSH, Kerberos and SSL ensures that data is encrypted and also authenticated all the way from the source to the destination.
Sure, some would agree that an VPN or IPSEC is good enough, but I think it's not really worth it to give people that option. A better soulution is to integrate the end-to-end security protocol with the tunneling protocol. That is, you start by letting SSH or whatever do its job and secure the connection. Then, if it detects that there's a connection between host A and B and both hosts are doing both IPSEC and SSH, then the SSH context can be used to do an extra verification of the IPSEC keys and then SSH can stop encrypting. Of course, that doesn't work when the tunnel endpoint isn't at your SSH server, but as I said, I don't trust "secure networks" anyway. ;) |