From: “Perry E. Metzger” <perry@piermont.com>
To: Chad Dougherty <chad@lycos.com>
Message Hash: 4e141545ba6ec37f3a2a1e25d1c1a167472e60142b1dbd542f5b2cb85ef4e0bf
Message ID: <199609271552.LAA08679@jekyll.piermont.com>
Reply To: <199609270608.CAA24129@rat.eng.lycos.com>
UTC Datetime: 1996-09-27 19:17:35 UTC
Raw Date: Sat, 28 Sep 1996 03:17:35 +0800
From: "Perry E. Metzger" <perry@piermont.com>
Date: Sat, 28 Sep 1996 03:17:35 +0800
To: Chad Dougherty <chad@lycos.com>
Subject: Re: ssh - How widely used?
In-Reply-To: <199609270608.CAA24129@rat.eng.lycos.com>
Message-ID: <199609271552.LAA08679@jekyll.piermont.com>
MIME-Version: 1.0
Content-Type: text/plain
Chad Dougherty writes:
> > Despite all this, I use it, like it, and recomend it for use
> > in systems not likely to come under attack by professionals.
>
> Why do you say "not likely to come under attack by professionals"?
> Have you found security holes in it?
Security professionals do not recommend use of systems they feel less
than perfectly comfortable with whether or not they know of specific
holes.
Perry
PS sorry for posting something about a cryptographic security system
in the midst of all the normal talk -- I know its off topic.
Return to September 1996
Return to “Roger Williams <roger@coelacanth.com>”