[40038] in North American Network Operators' Group
RE: telnet vs ssh on Core equipment , looking for reasons why ?
daemon@ATHENA.MIT.EDU (alex@yuriev.com)
Tue Jul 31 12:45:11 2001
Date: Tue, 31 Jul 2001 12:41:23 -0400 (EDT)
From: <alex@yuriev.com>
To: Dave Israel <davei@biohazard.demon.digex.net>
Cc: Daniel Golding <dan@netrail.net>,
"Mr. James W. Laferriere" <babydr@baby-dragons.com>, nanog@merit.edu
In-Reply-To: <15206.57033.763818.451762@biohazard.demon.digex.net>
Message-ID: <Pine.LNX.3.96.1010731124007.29579i-100000@cathy.uuworld.com>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Errors-To: owner-nanog-outgoing@merit.edu
>
> 2) Your vendor's ssh authentication creates a secure connection, and
> transfers the password securely, only to then send the password,
> unencrypted, to an authentication server for verification, making
> ssh moot.
Establish reasonable path for trust propagation and you have solved the
problem.
Alex