[40053] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

RE: telnet vs ssh on Core equipment , looking for reasons why ?

daemon@ATHENA.MIT.EDU (alex@yuriev.com)
Tue Jul 31 17:02:13 2001

Date: Tue, 31 Jul 2001 16:57:36 -0400 (EDT)
From: <alex@yuriev.com>
To: Dave Israel <davei@biohazard.demon.digex.net>
Cc: nanog@merit.edu
In-Reply-To: <15206.64587.933042.618981@biohazard.demon.digex.net>
Message-ID: <Pine.LNX.3.96.1010731165647.889D-100000@cathy.uuworld.com>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Errors-To: owner-nanog-outgoing@merit.edu


> So... does anybody know how long it takes to hack an ssh key given
> identity and identity.pub?  Because, if I have your machine, I have
> these... it's just a matter of unlocking your passphrase.  (And not
> even that, if you're running ssh-agent and I can get to that...)

Very long time. It can be solved using the Chineese television problem. If I
recall correctly, it will take a few hundred years provided you did have
Chineese television. :)

Alex


home help back first fref pref prev next nref lref last post