From: “Ian Farquhar” <ianf@wiley.sydney.sgi.com>
To: Adam Shostack <hayden@krypton.mankato.msus.edu
Message Hash: d66b1d0a0eb2137165c21efc86bf4ce84c604dbfc7a30011274cd56c7778567c
Message ID: <9409131812.ZM11343@wiley.sydney.sgi.com>
Reply To: <199409121847.OAA17194@arthur.bwh.harvard.edu>
UTC Datetime: 1994-09-13 08:17:21 UTC
Raw Date: Tue, 13 Sep 94 01:17:21 PDT
From: "Ian Farquhar" <ianf@wiley.sydney.sgi.com>
Date: Tue, 13 Sep 94 01:17:21 PDT
To: Adam Shostack <hayden@krypton.mankato.msus.edu
Subject: Re: "Packet Sniffers"
In-Reply-To: <199409121847.OAA17194@arthur.bwh.harvard.edu>
Message-ID: <9409131812.ZM11343@wiley.sydney.sgi.com>
MIME-Version: 1.0
Content-Type: text/plain
On Sep 12, 2:47pm, Adam Shostack wrote:
> The way thinnet ethernet works, all machines on the net will
> probably see all packets going to/from any of them.
All machine on the same PHYSICAL network will.
If the university is worried about password sniffing, they should put
the machine on a bridged ethernet segment. If they're really concerned,
give them their own subnet and apply an appropriate routing policy. This
is not difficult.
> The way telnet works has no
> encryption in it; the password you type gets sent across the network
> as you type it. This is barely even a secret anymore.
It never was a secret.
Ian.
Return to September 1994
Return to ““Robert A. Hayden” <hayden@krypton.mankato.msus.edu>”