[40053] in North American Network Operators' Group
RE: telnet vs ssh on Core equipment , looking for reasons why ?
daemon@ATHENA.MIT.EDU (alex@yuriev.com)
Tue Jul 31 17:02:13 2001
Date: Tue, 31 Jul 2001 16:57:36 -0400 (EDT)
From: <alex@yuriev.com>
To: Dave Israel <davei@biohazard.demon.digex.net>
Cc: nanog@merit.edu
In-Reply-To: <15206.64587.933042.618981@biohazard.demon.digex.net>
Message-ID: <Pine.LNX.3.96.1010731165647.889D-100000@cathy.uuworld.com>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Errors-To: owner-nanog-outgoing@merit.edu
> So... does anybody know how long it takes to hack an ssh key given
> identity and identity.pub? Because, if I have your machine, I have
> these... it's just a matter of unlocking your passphrase. (And not
> even that, if you're running ssh-agent and I can get to that...)
Very long time. It can be solved using the Chineese television problem. If I
recall correctly, it will take a few hundred years provided you did have
Chineese television. :)
Alex